Loading ...

Play interactive tourEdit tour

Analysis Report Quotation_Request.pdf.exe

Overview

General Information

Sample Name:Quotation_Request.pdf.exe
Analysis ID:381954
MD5:79cd8383f51372c9f0721289f6470889
SHA1:41b082acc2c9725da7c20ff93dc26df2ab06d1aa
SHA256:08ecce1fb89755fa576a2c1c855bbb0f701ef20c791f56dc0c675fb2a8163691
Tags:exeNanoCore
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Sigma detected: Suspicious Double Extension
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • Quotation_Request.pdf.exe (PID: 6812 cmdline: 'C:\Users\user\Desktop\Quotation_Request.pdf.exe' MD5: 79CD8383F51372C9F0721289F6470889)
    • schtasks.exe (PID: 7156 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\mgdPGGmBTUB' /XML 'C:\Users\user\AppData\Local\Temp\tmp4108.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Domain1": "185.140.53.138", "Domain2": "wealth2021.ddns.net", "Port": 20221, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x2f25:$a: NanoCore
    • 0x2f7e:$a: NanoCore
    • 0x2fbb:$a: NanoCore
    • 0x3034:$a: NanoCore
    • 0x166df:$a: NanoCore
    • 0x166f4:$a: NanoCore
    • 0x16729:$a: NanoCore
    • 0x2f1ab:$a: NanoCore
    • 0x2f1c0:$a: NanoCore
    • 0x2f1f5:$a: NanoCore
    • 0x2f87:$b: ClientPlugin
    • 0x2fc4:$b: ClientPlugin
    • 0x38c2:$b: ClientPlugin
    • 0x38cf:$b: ClientPlugin
    • 0x1649b:$b: ClientPlugin
    • 0x164b6:$b: ClientPlugin
    • 0x164e6:$b: ClientPlugin
    • 0x166fd:$b: ClientPlugin
    • 0x16732:$b: ClientPlugin
    • 0x2ef67:$b: ClientPlugin
    • 0x2ef82:$b: ClientPlugin
    00000007.00000002.910440446.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000007.00000002.910440446.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000007.00000002.910440446.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfcf5:$a: NanoCore
      • 0xfd05:$a: NanoCore
      • 0xff39:$a: NanoCore
      • 0xff4d:$a: NanoCore
      • 0xff8d:$a: NanoCore
      • 0xfd54:$b: ClientPlugin
      • 0xff56:$b: ClientPlugin
      • 0xff96:$b: ClientPlugin
      • 0xfe7b:$c: ProjectData
      • 0x10882:$d: DESCrypto
      • 0x1824e:$e: KeepAlive
      • 0x1623c:$g: LogClientMessage
      • 0x12437:$i: get_Connected
      • 0x10bb8:$j: #=q
      • 0x10be8:$j: #=q
      • 0x10c04:$j: #=q
      • 0x10c34:$j: #=q
      • 0x10c50:$j: #=q
      • 0x10c6c:$j: #=q
      • 0x10c9c:$j: #=q
      • 0x10cb8:$j: #=q
      Click to see the 16 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      7.2.Quotation_Request.pdf.exe.5ab4629.9.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xb184:$x1: NanoCore.ClientPluginHost
      • 0xb1b1:$x2: IClientNetworkHost
      7.2.Quotation_Request.pdf.exe.5ab4629.9.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xb184:$x2: NanoCore.ClientPluginHost
      • 0xc25f:$s4: PipeCreated
      • 0xb19e:$s5: IClientLoggingHost
      7.2.Quotation_Request.pdf.exe.5ab4629.9.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        7.2.Quotation_Request.pdf.exe.58e0000.7.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        7.2.Quotation_Request.pdf.exe.58e0000.7.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        Click to see the 35 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Quotation_Request.pdf.exe, ProcessId: 6184, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\mgdPGGmBTUB' /XML 'C:\Users\user\AppData\Local\Temp\tmp4108.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\mgdPGGmBTUB' /XML 'C:\Users\user\AppData\Local\Temp\tmp4108.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\Quotation_Request.pdf.exe' , ParentImage: C:\Users\user\Desktop\Quotation_Request.pdf.exe, ParentProcessId: 6812, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\mgdPGGmBTUB' /XML 'C:\Users\user\AppData\Local\Temp\tmp4108.tmp', ProcessId: 7156
        Sigma detected: Suspicious Double ExtensionShow sources
        Source: Process startedAuthor: Florian Roth (rule), @blu3_team (idea): Data: Command: {path}, CommandLine: {path}, CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\Quotation_Request.pdf.exe, NewProcessName: C:\Users\user\Desktop\Quotation_Request.pdf.exe, OriginalFileName: C:\Users\user\Desktop\Quotation_Request.pdf.exe, ParentCommandLine: 'C:\Users\user\Desktop\Quotation_Request.pdf.exe' , ParentImage: C:\Users\user\Desktop\Quotation_Request.pdf.exe, ParentProcessId: 6812, ProcessCommandLine: {path}, ProcessId: 6184

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Domain1": "185.140.53.138", "Domain2": "wealth2021.ddns.net", "Port": 20221, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\mgdPGGmBTUB.exeMetadefender: Detection: 18%Perma Link
        Source: C:\Users\user\AppData\Roaming\mgdPGGmBTUB.exeReversingLabs: Detection: 58%
        Multi AV Scanner detection for submitted fileShow sources
        Source: Quotation_Request.pdf.exeVirustotal: Detection: 30%Perma Link
        Source: Quotation_Request.pdf.exeMetadefender: Detection: 18%Perma Link
        Source: Quotation_Request.pdf.exeReversingLabs: Detection: 58%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.910440446.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.912659858.0000000003201000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.672015342.00000000040A0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.917702828.0000000005AB0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.671468034.0000000003DD9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Quotation_Request.pdf.exe PID: 6184, type: MEMORY
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.5ab4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.424ff7c.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.42545a5.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.5ab0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Quotation_Request.pdf.exe.4054958.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.5ab0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.424ff7c.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Quotation_Request.pdf.exe.4054958.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.424b146.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Quotation_Request.pdf.exe.3f6fb08.2.raw.unpack, type: UNPACKEDPE
        Source: 7.2.Quotation_Request.pdf.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.2.Quotation_Request.pdf.exe.5ab0000.10.unpackAvira: Label: TR/NanoCore.fadte
        Source: Quotation_Request.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: Quotation_Request.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: wealth2021.ddns.net
        Source: Malware configuration extractorURLs: 185.140.53.138
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: wealth2021.ddns.net
        Source: global trafficTCP traffic: 192.168.2.4:49726 -> 185.140.53.138:20221
        Source: Joe Sandbox ViewIP Address: 185.140.53.138 185.140.53.138
        Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
        Source: unknownDNS traffic detected: queries for: wealth2021.ddns.net
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: Quotation_Request.pdf.exe, 00000000.00000002.679777119.0000000009011000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: Quotation_Request.pdf.exe, 00000000.00000002.671021338.0000000001487000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comB.TTFZ
        Source: Quotation_Request.pdf.exe, 00000000.00000002.671021338.0000000001487000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.coma~
        Source: Quotation_Request.pdf.exe, 00000000.00000002.671021338.0000000001487000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comue9
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: Quotation_Request.pdf.exe, 00000000.00000002.670658902.0000000001178000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: Quotation_Request.pdf.exe, 00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.910440446.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.912659858.0000000003201000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.672015342.00000000040A0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.917702828.0000000005AB0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.671468034.0000000003DD9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Quotation_Request.pdf.exe PID: 6184, type: MEMORY
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.5ab4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.424ff7c.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.42545a5.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.5ab0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Quotation_Request.pdf.exe.4054958.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.5ab0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.424ff7c.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Quotation_Request.pdf.exe.4054958.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.424b146.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Quotation_Request.pdf.exe.3f6fb08.2.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.910440446.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.910440446.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.672015342.00000000040A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.672015342.00000000040A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.917484017.00000000058E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.917702828.0000000005AB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.671468034.0000000003DD9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.671468034.0000000003DD9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: Quotation_Request.pdf.exe PID: 6184, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: Quotation_Request.pdf.exe PID: 6184, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.Quotation_Request.pdf.exe.5ab4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.Quotation_Request.pdf.exe.58e0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.Quotation_Request.pdf.exe.424ff7c.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.Quotation_Request.pdf.exe.3254e94.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.Quotation_Request.pdf.exe.42545a5.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.Quotation_Request.pdf.exe.5ab0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Quotation_Request.pdf.exe.4054958.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Quotation_Request.pdf.exe.4054958.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.Quotation_Request.pdf.exe.5ab0000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.Quotation_Request.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.Quotation_Request.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.Quotation_Request.pdf.exe.424ff7c.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Quotation_Request.pdf.exe.4054958.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Quotation_Request.pdf.exe.4054958.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.Quotation_Request.pdf.exe.424b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.Quotation_Request.pdf.exe.424b146.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.Quotation_Request.pdf.exe.3f6fb08.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Quotation_Request.pdf.exe.3f6fb08.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: Quotation_Request.pdf.exe
        Source: initial sampleStatic PE information: Filename: Quotation_Request.pdf.exe
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_00A55175
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_0146C304
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_0146E740
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_0146E750
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_04E325A8
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_04E31588
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_04E36FB8
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_04E32328
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_04E30B18
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_04E30DC8
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_04E30DBB
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_04E32598
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_04E31578
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_04E31FE0
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_04E31FF0
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_04E30B09
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_04E32318
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BDD500
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD7488
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BDB0D0
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD68C0
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BDB0C0
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BDD9E8
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BDF1D8
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD7138
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD5D30
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BDB528
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD5D20
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BDB518
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD6978
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD8D70
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD5568
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD7148
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BDAEB0
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BDAEA3
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BDAAF8
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD3ED8
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD3EC8
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD8E60
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD5250
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD7F98
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD7F88
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BDAB08
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BDB348
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BDB341
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 7_2_00E85175
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 7_2_056EE471
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 7_2_056EE480
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 7_2_056EBBD4
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 7_2_0583F5F8
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 7_2_05839788
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 7_2_0583A5D0
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 7_2_0583A5F8
        Source: Quotation_Request.pdf.exeBinary or memory string: OriginalFilename vs Quotation_Request.pdf.exe
        Source: Quotation_Request.pdf.exe, 00000000.00000002.680531854.0000000010720000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs Quotation_Request.pdf.exe
        Source: Quotation_Request.pdf.exe, 00000000.00000002.670658902.0000000001178000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Quotation_Request.pdf.exe
        Source: Quotation_Request.pdf.exe, 00000000.00000002.678847721.00000000072A0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs Quotation_Request.pdf.exe
        Source: Quotation_Request.pdf.exe, 00000000.00000002.679162865.0000000007770000.00000002.00000001.sdmpBinary or memory string: originalfilename vs Quotation_Request.pdf.exe
        Source: Quotation_Request.pdf.exe, 00000000.00000002.679162865.0000000007770000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs Quotation_Request.pdf.exe
        Source: Quotation_Request.pdf.exe, 00000000.00000002.679394775.0000000008AD0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Quotation_Request.pdf.exe
        Source: Quotation_Request.pdf.exe, 00000000.00000002.671368871.0000000002E06000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMetroFramework.dll> vs Quotation_Request.pdf.exe
        Source: Quotation_Request.pdf.exeBinary or memory string: OriginalFilename vs Quotation_Request.pdf.exe
        Source: Quotation_Request.pdf.exe, 00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Quotation_Request.pdf.exe
        Source: Quotation_Request.pdf.exe, 00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Quotation_Request.pdf.exe
        Source: Quotation_Request.pdf.exe, 00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Quotation_Request.pdf.exe
        Source: Quotation_Request.pdf.exe, 00000007.00000002.911620548.0000000001548000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Quotation_Request.pdf.exe
        Source: Quotation_Request.pdf.exe, 00000007.00000002.918173912.0000000006C10000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs Quotation_Request.pdf.exe
        Source: Quotation_Request.pdf.exeBinary or memory string: OriginalFilename vs Quotation_Request.pdf.exe
        Source: Quotation_Request.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.910440446.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.910440446.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.672015342.00000000040A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.672015342.00000000040A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.917484017.00000000058E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.917484017.00000000058E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000007.00000002.917702828.0000000005AB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.917702828.0000000005AB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000000.00000002.671468034.0000000003DD9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.671468034.0000000003DD9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: Quotation_Request.pdf.exe PID: 6184, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: Quotation_Request.pdf.exe PID: 6184, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.Quotation_Request.pdf.exe.5ab4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.Quotation_Request.pdf.exe.5ab4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.Quotation_Request.pdf.exe.58e0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.Quotation_Request.pdf.exe.58e0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.Quotation_Request.pdf.exe.424ff7c.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.Quotation_Request.pdf.exe.424ff7c.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.Quotation_Request.pdf.exe.3254e94.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.Quotation_Request.pdf.exe.42545a5.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.Quotation_Request.pdf.exe.42545a5.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.Quotation_Request.pdf.exe.5ab0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.Quotation_Request.pdf.exe.5ab0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.Quotation_Request.pdf.exe.4054958.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.Quotation_Request.pdf.exe.4054958.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.Quotation_Request.pdf.exe.4054958.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.Quotation_Request.pdf.exe.5ab0000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.Quotation_Request.pdf.exe.5ab0000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.Quotation_Request.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.Quotation_Request.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.Quotation_Request.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.Quotation_Request.pdf.exe.424ff7c.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.Quotation_Request.pdf.exe.424ff7c.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.Quotation_Request.pdf.exe.4054958.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.Quotation_Request.pdf.exe.4054958.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.Quotation_Request.pdf.exe.4054958.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.Quotation_Request.pdf.exe.424b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.Quotation_Request.pdf.exe.424b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.Quotation_Request.pdf.exe.424b146.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.Quotation_Request.pdf.exe.3f6fb08.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.Quotation_Request.pdf.exe.3f6fb08.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Quotation_Request.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: mgdPGGmBTUB.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 7.2.Quotation_Request.pdf.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 7.2.Quotation_Request.pdf.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 7.2.Quotation_Request.pdf.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@6/4@10/1
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeFile created: C:\Users\user\AppData\Roaming\mgdPGGmBTUB.exeJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7164:120:WilError_01
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\ezkCzBbgDrtHZqSnkTc
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{ae697278-0563-480d-a326-4f0ab2164ba0}
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmp4108.tmpJump to behavior
        Source: Quotation_Request.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: Quotation_Request.pdf.exeVirustotal: Detection: 30%
        Source: Quotation_Request.pdf.exeMetadefender: Detection: 18%
        Source: Quotation_Request.pdf.exeReversingLabs: Detection: 58%
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeFile read: C:\Users\user\Desktop\Quotation_Request.pdf.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\Quotation_Request.pdf.exe 'C:\Users\user\Desktop\Quotation_Request.pdf.exe'
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\mgdPGGmBTUB' /XML 'C:\Users\user\AppData\Local\Temp\tmp4108.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess created: C:\Users\user\Desktop\Quotation_Request.pdf.exe {path}
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\mgdPGGmBTUB' /XML 'C:\Users\user\AppData\Local\Temp\tmp4108.tmp'
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess created: C:\Users\user\Desktop\Quotation_Request.pdf.exe {path}
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: Quotation_Request.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: Quotation_Request.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Data Obfuscation:

        barindex
        .NET source code contains method to dynamically call methods (often used by packers)Show sources
        Source: Quotation_Request.pdf.exe, FrmMain.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: mgdPGGmBTUB.exe.0.dr, FrmMain.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 0.0.Quotation_Request.pdf.exe.a50000.0.unpack, FrmMain.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 0.2.Quotation_Request.pdf.exe.a50000.0.unpack, FrmMain.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 7.2.Quotation_Request.pdf.exe.e80000.1.unpack, FrmMain.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 7.0.Quotation_Request.pdf.exe.e80000.0.unpack, FrmMain.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
        .NET source code contains potential unpackerShow sources
        Source: Quotation_Request.pdf.exe, FrmMain.cs.Net Code: sssss System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: mgdPGGmBTUB.exe.0.dr, FrmMain.cs.Net Code: sssss System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.Quotation_Request.pdf.exe.a50000.0.unpack, FrmMain.cs.Net Code: sssss System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.Quotation_Request.pdf.exe.a50000.0.unpack, FrmMain.cs.Net Code: sssss System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.2.Quotation_Request.pdf.exe.e80000.1.unpack, FrmMain.cs.Net Code: sssss System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.2.Quotation_Request.pdf.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.2.Quotation_Request.pdf.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.Quotation_Request.pdf.exe.e80000.0.unpack, FrmMain.cs.Net Code: sssss System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_04E3293A push ebp; ret
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_04E302AE push ss; ret
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD61E6 push esi; iretd
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 0_2_08BD6226 push ss; iretd
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 7_2_058369FB push esp; retf
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeCode function: 7_2_058369F8 pushad ; retf
        Source: initial sampleStatic PE information: section name: .text entropy: 7.72629270512
        Source: initial sampleStatic PE information: section name: .text entropy: 7.72629270512
        Source: 7.2.Quotation_Request.pdf.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 7.2.Quotation_Request.pdf.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeFile created: C:\Users\user\AppData\Roaming\mgdPGGmBTUB.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\mgdPGGmBTUB' /XML 'C:\Users\user\AppData\Local\Temp\tmp4108.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Uses an obfuscated file name to hide its real file extension (double extension)Show sources
        Source: Possible double extension: pdf.exeStatic PE information: Quotation_Request.pdf.exe
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: Process Memory Space: Quotation_Request.pdf.exe PID: 6812, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: Quotation_Request.pdf.exe, 00000000.00000002.679777119.0000000009011000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: Quotation_Request.pdf.exe, 00000000.00000002.679777119.0000000009011000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeWindow / User API: threadDelayed 1166
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeWindow / User API: threadDelayed 8481
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeWindow / User API: foregroundWindowGot 951
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exe TID: 6816Thread sleep time: -31500s >= -30000s
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exe TID: 6836Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exe TID: 4284Thread sleep time: -7378697629483816s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeThread delayed: delay time: 31500
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeThread delayed: delay time: 922337203685477
        Source: Quotation_Request.pdf.exe, 00000000.00000002.679777119.0000000009011000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
        Source: Quotation_Request.pdf.exe, 00000007.00000002.918173912.0000000006C10000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: Quotation_Request.pdf.exe, 00000000.00000002.679777119.0000000009011000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: Quotation_Request.pdf.exe, 00000000.00000002.679777119.0000000009011000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: Quotation_Request.pdf.exe, 00000000.00000002.679777119.0000000009011000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: Quotation_Request.pdf.exe, 00000000.00000002.679777119.0000000009011000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: Quotation_Request.pdf.exe, 00000000.00000002.679777119.0000000009011000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: Quotation_Request.pdf.exe, 00000007.00000002.918173912.0000000006C10000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: Quotation_Request.pdf.exe, 00000007.00000002.918173912.0000000006C10000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: Quotation_Request.pdf.exe, 00000000.00000002.679777119.0000000009011000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: Quotation_Request.pdf.exe, 00000000.00000002.679777119.0000000009011000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: Quotation_Request.pdf.exe, 00000000.00000002.679777119.0000000009011000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: Quotation_Request.pdf.exe, 00000007.00000002.911982296.00000000015F8000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: Quotation_Request.pdf.exe, 00000007.00000002.918173912.0000000006C10000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeMemory written: C:\Users\user\Desktop\Quotation_Request.pdf.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\mgdPGGmBTUB' /XML 'C:\Users\user\AppData\Local\Temp\tmp4108.tmp'
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeProcess created: C:\Users\user\Desktop\Quotation_Request.pdf.exe {path}
        Source: Quotation_Request.pdf.exe, 00000007.00000002.917874322.000000000636B000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: Quotation_Request.pdf.exe, 00000007.00000002.912140848.0000000001BD0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: Quotation_Request.pdf.exe, 00000007.00000002.912659858.0000000003201000.00000004.00000001.sdmpBinary or memory string: Program ManagerD$8k
        Source: Quotation_Request.pdf.exe, 00000007.00000002.912140848.0000000001BD0000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: Quotation_Request.pdf.exe, 00000007.00000002.912855966.0000000003347000.00000004.00000001.sdmpBinary or memory string: Program ManagerHa8k(
        Source: Quotation_Request.pdf.exe, 00000007.00000002.914223191.00000000037B9000.00000004.00000001.sdmpBinary or memory string: Program Managerd/
        Source: Quotation_Request.pdf.exe, 00000007.00000002.918835809.00000000072FD000.00000004.00000001.sdmpBinary or memory string: kProgram Manager X
        Source: Quotation_Request.pdf.exe, 00000007.00000002.912140848.0000000001BD0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: Quotation_Request.pdf.exe, 00000007.00000002.912855966.0000000003347000.00000004.00000001.sdmpBinary or memory string: Program ManagerHa8k
        Source: Quotation_Request.pdf.exe, 00000007.00000002.918103478.000000000698E000.00000004.00000010.sdmpBinary or memory string: Program Manager
        Source: Quotation_Request.pdf.exe, 00000007.00000002.912659858.0000000003201000.00000004.00000001.sdmpBinary or memory string: Program Manager`
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Users\user\Desktop\Quotation_Request.pdf.exe VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Users\user\Desktop\Quotation_Request.pdf.exe VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\Quotation_Request.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.910440446.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.912659858.0000000003201000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.672015342.00000000040A0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.917702828.0000000005AB0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.671468034.0000000003DD9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Quotation_Request.pdf.exe PID: 6184, type: MEMORY
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.5ab4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.424ff7c.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.42545a5.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.5ab0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Quotation_Request.pdf.exe.4054958.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.5ab0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.424ff7c.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Quotation_Request.pdf.exe.4054958.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.424b146.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Quotation_Request.pdf.exe.3f6fb08.2.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: Quotation_Request.pdf.exe, 00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Quotation_Request.pdf.exe, 00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.910440446.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.912659858.0000000003201000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.672015342.00000000040A0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.917702828.0000000005AB0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.671468034.0000000003DD9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Quotation_Request.pdf.exe PID: 6184, type: MEMORY
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.5ab4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.424ff7c.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.42545a5.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.5ab0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Quotation_Request.pdf.exe.4054958.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.5ab0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.424ff7c.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Quotation_Request.pdf.exe.4054958.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.Quotation_Request.pdf.exe.424b146.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Quotation_Request.pdf.exe.3f6fb08.2.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection112Masquerading11Input Capture21Security Software Discovery211Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information12Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing23DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        Quotation_Request.pdf.exe30%VirustotalBrowse
        Quotation_Request.pdf.exe24%MetadefenderBrowse
        Quotation_Request.pdf.exe58%ReversingLabsWin32.Trojan.AgentTesla

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\mgdPGGmBTUB.exe24%MetadefenderBrowse
        C:\Users\user\AppData\Roaming\mgdPGGmBTUB.exe58%ReversingLabsWin32.Trojan.AgentTesla

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        7.2.Quotation_Request.pdf.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.2.Quotation_Request.pdf.exe.5ab0000.10.unpack100%AviraTR/NanoCore.fadteDownload File

        Domains

        SourceDetectionScannerLabelLink
        wealth2021.ddns.net0%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.fontbureau.coma~0%Avira URL Cloudsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        wealth2021.ddns.net0%VirustotalBrowse
        wealth2021.ddns.net0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.fontbureau.comB.TTFZ0%Avira URL Cloudsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        185.140.53.1380%Avira URL Cloudsafe
        http://www.fontbureau.comue90%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        wealth2021.ddns.net
        185.140.53.138
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        wealth2021.ddns.nettrue
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        185.140.53.138true
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.apache.org/licenses/LICENSE-2.0Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
          high
          http://www.fontbureau.comQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
            high
            http://www.fontbureau.com/designersGQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
              high
              http://www.fontbureau.com/designers/?Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                high
                http://www.founder.com.cn/cn/bTheQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers?Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                  high
                  http://www.tiro.comQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.coma~Quotation_Request.pdf.exe, 00000000.00000002.671021338.0000000001487000.00000004.00000040.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.fontbureau.com/designersQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                    high
                    http://www.goodfont.co.krQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comlQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.comQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.typography.netDQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlNQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/cTheQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.comQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/frere-user.htmlQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/DPleaseQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers8Quotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                          high
                          http://www.fontbureau.comB.TTFZQuotation_Request.pdf.exe, 00000000.00000002.671021338.0000000001487000.00000004.00000040.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fonts.comQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                            high
                            http://www.sandoll.co.krQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deDPleaseQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cnQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameQuotation_Request.pdf.exe, 00000000.00000002.679777119.0000000009011000.00000004.00000001.sdmpfalse
                              high
                              http://www.sakkal.comQuotation_Request.pdf.exe, 00000000.00000002.678291126.0000000006EC2000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comue9Quotation_Request.pdf.exe, 00000000.00000002.671021338.0000000001487000.00000004.00000040.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              185.140.53.138
                              wealth2021.ddns.netSweden
                              209623DAVID_CRAIGGGtrue

                              General Information

                              Joe Sandbox Version:31.0.0 Emerald
                              Analysis ID:381954
                              Start date:05.04.2021
                              Start time:15:22:16
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 7m 56s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:Quotation_Request.pdf.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:21
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@6/4@10/1
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 0% (good quality ratio 0%)
                              • Quality average: 73.2%
                              • Quality standard deviation: 8.9%
                              HCA Information:
                              • Successful, ratio: 98%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                              • TCP Packets have been reduced to 100
                              • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                              • Excluded IPs from analysis (whitelisted): 104.42.151.234, 92.122.145.220, 104.43.139.144, 20.82.209.183, 168.61.161.212, 13.64.90.137, 92.122.213.247, 92.122.213.194, 52.155.217.156, 93.184.221.240, 20.54.26.129, 20.82.210.154
                              • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, wu.wpc.apr-52dd2.edgecastdns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu.ec.azureedge.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              15:23:10API Interceptor2x Sleep call for process: Quotation_Request.pdf.exe modified

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              185.140.53.138URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                  1PH37n4Gva.exeGet hashmaliciousBrowse
                                    35dbds3GQG.exeGet hashmaliciousBrowse
                                      QXJGE2LOdP.exeGet hashmaliciousBrowse
                                        O4m3hDFNbh.exeGet hashmaliciousBrowse
                                          nrv_remittance#U007eorder#U007epayment.exeGet hashmaliciousBrowse
                                            NEW ORDER REQUEST_EXPORT005JKL DOC.exeGet hashmaliciousBrowse
                                              WIRE COPY ORDER T104484_PP.exeGet hashmaliciousBrowse
                                                71AXBkD1wA.exeGet hashmaliciousBrowse

                                                  Domains

                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                  wealth2021.ddns.netURGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                                  • 185.140.53.138
                                                  Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                                  • 185.140.53.138

                                                  ASN

                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                  DAVID_CRAIGGGFRQ_05694 revised quantity.exeGet hashmaliciousBrowse
                                                  • 185.140.53.69
                                                  INVOICE 15112021.xlsxGet hashmaliciousBrowse
                                                  • 185.140.53.130
                                                  URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                                  • 185.140.53.138
                                                  IMG-001982-AW00173-SSE73I.exeGet hashmaliciousBrowse
                                                  • 185.140.53.230
                                                  FYI-Orderimg.exeGet hashmaliciousBrowse
                                                  • 185.140.53.67
                                                  Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                                  • 185.140.53.138
                                                  PO-94765809570-Order pdf.exeGet hashmaliciousBrowse
                                                  • 185.140.53.7
                                                  Commercial E-invoice.exeGet hashmaliciousBrowse
                                                  • 185.140.53.137
                                                  Order23032021.xlsGet hashmaliciousBrowse
                                                  • 185.140.53.130
                                                  ZcQwvgqtuQ.exeGet hashmaliciousBrowse
                                                  • 91.193.75.245
                                                  lKIPqaYkKB.exeGet hashmaliciousBrowse
                                                  • 185.140.53.161
                                                  t5R60D503x.exeGet hashmaliciousBrowse
                                                  • 185.140.53.9
                                                  Purchase OrderDated19032021.xlsGet hashmaliciousBrowse
                                                  • 185.140.53.130
                                                  0u1JLpIwRo.exeGet hashmaliciousBrowse
                                                  • 185.140.53.139
                                                  PO-21322.xlsmGet hashmaliciousBrowse
                                                  • 185.165.153.116
                                                  GT_0397337_03987638BNG.exeGet hashmaliciousBrowse
                                                  • 185.140.53.9
                                                  5woB0vy0X6.exeGet hashmaliciousBrowse
                                                  • 185.140.53.139
                                                  Doc_IMAGE-587HTY-9545-55401.exeGet hashmaliciousBrowse
                                                  • 185.140.53.230
                                                  1PH37n4Gva.exeGet hashmaliciousBrowse
                                                  • 185.140.53.138
                                                  malwa.exeGet hashmaliciousBrowse
                                                  • 185.140.53.9

                                                  JA3 Fingerprints

                                                  No context

                                                  Dropped Files

                                                  No context

                                                  Created / dropped Files

                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Quotation_Request.pdf.exe.log
                                                  Process:C:\Users\user\Desktop\Quotation_Request.pdf.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1216
                                                  Entropy (8bit):5.355304211458859
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                  Malicious:true
                                                  Reputation:high, very likely benign file
                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                  C:\Users\user\AppData\Local\Temp\tmp4108.tmp
                                                  Process:C:\Users\user\Desktop\Quotation_Request.pdf.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1644
                                                  Entropy (8bit):5.182019841935426
                                                  Encrypted:false
                                                  SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGZIHtn:cbhK79lNQR/rydbz9I3YODOLNdq3SIN
                                                  MD5:123A817F641F0B9C918EBC19CD3D8201
                                                  SHA1:BB9FFEE5B5B1DFD474A32613AC7E47C7CF3C7B0A
                                                  SHA-256:9AA7AAB06FD028D56A942827538DDDA1F3F3CF38BB4629EEDCB0A614E08F53A5
                                                  SHA-512:16C214D17BC5892D3CE2CA56127B4BE4EED9EE836E96B653482734EB5E496FE156DA9033A5F438B38D6F9395568027D212C15FD7EE92A441235CC23140C2307F
                                                  Malicious:true
                                                  Reputation:low
                                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                  Process:C:\Users\user\Desktop\Quotation_Request.pdf.exe
                                                  File Type:ISO-8859 text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):8
                                                  Entropy (8bit):2.75
                                                  Encrypted:false
                                                  SSDEEP:3:At:I
                                                  MD5:9B2EC0D9440BCD7D4CD589581B957612
                                                  SHA1:82648AF473218226F499D59C04621DD5172EC4A4
                                                  SHA-256:7BAF6E6ED1FF241E17C44045ED4A61647BE5C6C044CFCA0074D0FA95484D600D
                                                  SHA-512:E64DD78582CDC26433568BC11F8743C9600381D5AD4843E90FAE35E8457663716131994EBEDA99856AF587B3DE353ED05E533E957884CA88A4BEF8762681B5E2
                                                  Malicious:true
                                                  Reputation:low
                                                  Preview: '..5..H
                                                  C:\Users\user\AppData\Roaming\mgdPGGmBTUB.exe
                                                  Process:C:\Users\user\Desktop\Quotation_Request.pdf.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):763392
                                                  Entropy (8bit):7.718854206678139
                                                  Encrypted:false
                                                  SSDEEP:12288:M+7v0sCUuWvoXrR9yV2LNaQu4hy/f1oJ4W5erTf+uJTwtrG3:J7v0sCOvwlUV2pzvhy/fA4jSuNwtS3
                                                  MD5:79CD8383F51372C9F0721289F6470889
                                                  SHA1:41B082ACC2C9725DA7C20FF93DC26DF2AB06D1AA
                                                  SHA-256:08ECCE1FB89755FA576A2C1C855BBB0F701EF20C791F56DC0C675FB2A8163691
                                                  SHA-512:94D7101BDBA1B9A8A7D4C420B003505FBA2B731BCA7DF44B75D6A8E4E699141E76130DD2E5FB08A38D27533BAA8DEB4131EF91E59A8D94F40FDB384E408C636C
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Metadefender, Detection: 24%, Browse
                                                  • Antivirus: ReversingLabs, Detection: 58%
                                                  Reputation:low
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....i`..............0.................. ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......hT..lW......s...................................................0...........r...p.+..*..0...........r...p.+..*".(.....*...}.....(.......(......{....o.....*.0..D........r...p.(.......(.....(.......(.....(....Xs.... .... "...s....(2....*.0..+.........,..{.......+....,...{....o........(.....*..0................( ...s!.....s"...}.....s"...}.....s#...}.....s$...}.....s....}.....s#...}.....s#...}.....{....o%.....(%.....{......o&.....{.....A..s....o'.....{....r=..po(.....{.

                                                  Static File Info

                                                  General

                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):7.718854206678139
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Windows Screen Saver (13104/52) 0.07%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  File name:Quotation_Request.pdf.exe
                                                  File size:763392
                                                  MD5:79cd8383f51372c9f0721289f6470889
                                                  SHA1:41b082acc2c9725da7c20ff93dc26df2ab06d1aa
                                                  SHA256:08ecce1fb89755fa576a2c1c855bbb0f701ef20c791f56dc0c675fb2a8163691
                                                  SHA512:94d7101bdba1b9a8a7d4c420b003505fba2b731bca7df44b75d6a8e4e699141e76130dd2e5fb08a38d27533baa8deb4131ef91e59a8d94f40fdb384e408c636c
                                                  SSDEEP:12288:M+7v0sCUuWvoXrR9yV2LNaQu4hy/f1oJ4W5erTf+uJTwtrG3:J7v0sCOvwlUV2pzvhy/fA4jSuNwtS3
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....i`..............0.................. ........@.. ....................................@................................

                                                  File Icon

                                                  Icon Hash:00828e8e8686b000

                                                  Static PE Info

                                                  General

                                                  Entrypoint:0x4bba1e
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                  Time Stamp:0x606918F3 [Sun Apr 4 01:40:03 2021 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:v4.0.30319
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                  Entrypoint Preview

                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al

                                                  Data Directories

                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xbb9cc0x4f.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xbc0000x600.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xbe0000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                  Sections

                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000xb9a240xb9c00False0.855505551817data7.72629270512IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                  .rsrc0xbc0000x6000x600False0.446614583333data4.29278367861IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0xbe0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                  Resources

                                                  NameRVASizeTypeLanguageCountry
                                                  RT_VERSION0xbc0900x370data
                                                  RT_MANIFEST0xbc4100x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                  Imports

                                                  DLLImport
                                                  mscoree.dll_CorExeMain

                                                  Version Infos

                                                  DescriptionData
                                                  Translation0x0000 0x04b0
                                                  LegalCopyrightCopyright 2015 - 2021
                                                  Assembly Version1.0.0.0
                                                  InternalNameVjmG.exe
                                                  FileVersion1.0.0.0
                                                  CompanyNameMicroStar Ltd.
                                                  LegalTrademarks
                                                  Comments
                                                  ProductNameOnScreen Keyboard
                                                  ProductVersion1.0.0.0
                                                  FileDescriptionOnScreen Keyboard
                                                  OriginalFilenameVjmG.exe

                                                  Network Behavior

                                                  Network Port Distribution

                                                  TCP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Apr 5, 2021 15:23:17.607861042 CEST4972620221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:17.653534889 CEST2022149726185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:18.159513950 CEST4972620221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:18.206681013 CEST2022149726185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:18.722078085 CEST4972620221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:18.767683029 CEST2022149726185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:22.912301064 CEST4972720221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:22.958090067 CEST2022149727185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:23.472529888 CEST4972720221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:23.518239021 CEST2022149727185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:24.019490957 CEST4972720221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:24.065553904 CEST2022149727185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:28.083786964 CEST4972820221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:28.130881071 CEST2022149728185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:28.644769907 CEST4972820221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:28.690340996 CEST2022149728185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:29.191660881 CEST4972820221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:29.237917900 CEST2022149728185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:34.825510979 CEST4973620221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:34.871182919 CEST2022149736185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:35.470364094 CEST4973620221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:35.517622948 CEST2022149736185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:36.098436117 CEST4973620221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:36.148466110 CEST2022149736185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:40.223974943 CEST4974020221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:40.269721031 CEST2022149740185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:40.770755053 CEST4974020221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:40.818207026 CEST2022149740185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:41.333318949 CEST4974020221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:41.379131079 CEST2022149740185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:45.444089890 CEST4974420221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:45.489789009 CEST2022149744185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:45.989952087 CEST4974420221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:46.035653114 CEST2022149744185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:46.552690983 CEST4974420221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:46.598891020 CEST2022149744185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:50.793452978 CEST4974520221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:50.839010000 CEST2022149745185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:51.349710941 CEST4974520221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:51.395467997 CEST2022149745185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:51.896667957 CEST4974520221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:51.942327976 CEST2022149745185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:56.617027998 CEST4975920221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:56.662511110 CEST2022149759185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:57.165913105 CEST4975920221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:57.211484909 CEST2022149759185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:23:57.725228071 CEST4975920221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:23:57.771125078 CEST2022149759185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:01.773710012 CEST4976620221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:01.819453955 CEST2022149766185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:02.335194111 CEST4976620221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:02.380965948 CEST2022149766185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:02.897630930 CEST4976620221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:02.943443060 CEST2022149766185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:07.315881968 CEST4977220221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:07.361888885 CEST2022149772185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:07.866709948 CEST4977220221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:07.912590027 CEST2022149772185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:08.413638115 CEST4977220221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:08.461688042 CEST2022149772185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:12.535902977 CEST4977320221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:12.581716061 CEST2022149773185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:13.086002111 CEST4977320221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:13.131912947 CEST2022149773185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:13.633065939 CEST4977320221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:13.678936005 CEST2022149773185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:17.761533976 CEST4977420221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:17.807049990 CEST2022149774185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:18.321429014 CEST4977420221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:18.367001057 CEST2022149774185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:18.867739916 CEST4977420221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:18.913259983 CEST2022149774185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:22.917108059 CEST4977520221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:22.963478088 CEST2022149775185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:23.477396965 CEST4977520221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:23.523214102 CEST2022149775185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:24.024408102 CEST4977520221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:24.070384979 CEST2022149775185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:28.088346004 CEST4977620221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:28.134265900 CEST2022149776185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:28.634102106 CEST4977620221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:28.680378914 CEST2022149776185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:29.180941105 CEST4977620221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:29.226833105 CEST2022149776185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:33.230343103 CEST4977720221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:33.276026964 CEST2022149777185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:33.790694952 CEST4977720221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:33.836242914 CEST2022149777185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:34.337629080 CEST4977720221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:34.383364916 CEST2022149777185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:38.723659039 CEST4978020221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:38.769186974 CEST2022149780185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:39.275794983 CEST4978020221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:39.321897984 CEST2022149780185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:39.822644949 CEST4978020221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:39.869164944 CEST2022149780185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:43.950467110 CEST4978120221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:43.996074915 CEST2022149781185.140.53.138192.168.2.4
                                                  Apr 5, 2021 15:24:44.510476112 CEST4978120221192.168.2.4185.140.53.138
                                                  Apr 5, 2021 15:24:44.556098938 CEST2022149781185.140.53.138192.168.2.4

                                                  UDP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Apr 5, 2021 15:22:57.076585054 CEST5912353192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:22:57.125237942 CEST53591238.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:22:59.392405033 CEST5453153192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:22:59.448493004 CEST53545318.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:03.734442949 CEST4971453192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:03.780448914 CEST53497148.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:29.289285898 CEST5802853192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:29.335304022 CEST53580288.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:29.889949083 CEST5309753192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:29.940287113 CEST53530978.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:30.207901001 CEST4925753192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:30.253878117 CEST53492578.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:31.343485117 CEST6238953192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:31.389683008 CEST53623898.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:32.447273970 CEST4991053192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:32.501918077 CEST53499108.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:33.731245995 CEST5585453192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:33.777529955 CEST53558548.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:34.756750107 CEST6454953192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:34.813111067 CEST53645498.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:35.783266068 CEST6315353192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:35.829528093 CEST53631538.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:37.072853088 CEST5299153192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:37.121520042 CEST53529918.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:38.242674112 CEST5370053192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:38.301538944 CEST53537008.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:40.167418957 CEST5172653192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:40.222151041 CEST53517268.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:40.305469036 CEST5679453192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:40.351671934 CEST53567948.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:41.259121895 CEST5653453192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:41.320135117 CEST53565348.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:42.200365067 CEST5662753192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:42.254791975 CEST53566278.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:45.383425951 CEST5662153192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:45.442692041 CEST53566218.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:50.891860008 CEST6311653192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:50.973485947 CEST53631168.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:52.725776911 CEST6407853192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:52.771982908 CEST53640788.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:52.780220032 CEST6480153192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:52.834791899 CEST53648018.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:52.903156042 CEST6172153192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:52.950542927 CEST53617218.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:53.297838926 CEST5125553192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:53.357070923 CEST53512558.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:53.823276043 CEST6152253192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:53.857959986 CEST5233753192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:53.874413967 CEST5504653192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:53.904417992 CEST53523378.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:53.945683002 CEST53550468.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:53.951051950 CEST53615228.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:54.507186890 CEST4961253192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:54.561289072 CEST53496128.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:55.128628969 CEST4928553192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:55.199820995 CEST53492858.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:55.218028069 CEST5060153192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:55.266834021 CEST53506018.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:55.625034094 CEST6087553192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:55.681675911 CEST53608758.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:56.426668882 CEST5644853192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:56.486567020 CEST53564488.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:57.087918997 CEST5917253192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:57.133943081 CEST53591728.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:57.346832037 CEST6242053192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:57.404207945 CEST53624208.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:57.879070044 CEST6057953192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:57.933514118 CEST53605798.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:58.190025091 CEST5018353192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:58.236191034 CEST53501838.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:23:59.549933910 CEST6153153192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:23:59.599016905 CEST53615318.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:24:00.688536882 CEST4922853192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:24:00.734668970 CEST53492288.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:24:06.148242950 CEST5979453192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:24:06.204612970 CEST53597948.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:24:07.235183001 CEST5591653192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:24:07.292248011 CEST53559168.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:24:12.480107069 CEST5275253192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:24:12.534817934 CEST53527528.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:24:17.702697039 CEST6054253192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:24:17.760065079 CEST53605428.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:24:36.777991056 CEST6068953192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:24:36.823935032 CEST53606898.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:24:38.338413954 CEST6420653192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:24:38.408386946 CEST53642068.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:24:38.664572001 CEST5090453192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:24:38.719062090 CEST53509048.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:24:43.893048048 CEST5752553192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:24:43.947593927 CEST53575258.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:24:49.140777111 CEST5381453192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:24:49.197319984 CEST53538148.8.8.8192.168.2.4
                                                  Apr 5, 2021 15:25:10.003813982 CEST5341853192.168.2.48.8.8.8
                                                  Apr 5, 2021 15:25:10.058840036 CEST53534188.8.8.8192.168.2.4

                                                  DNS Queries

                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                  Apr 5, 2021 15:23:34.756750107 CEST192.168.2.48.8.8.80xa1cdStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:23:40.167418957 CEST192.168.2.48.8.8.80x3454Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:23:45.383425951 CEST192.168.2.48.8.8.80x5ef3Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:24:07.235183001 CEST192.168.2.48.8.8.80x903aStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:24:12.480107069 CEST192.168.2.48.8.8.80x3c89Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:24:17.702697039 CEST192.168.2.48.8.8.80xeb47Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:24:38.664572001 CEST192.168.2.48.8.8.80xa70bStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:24:43.893048048 CEST192.168.2.48.8.8.80xa719Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:24:49.140777111 CEST192.168.2.48.8.8.80x6998Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:25:10.003813982 CEST192.168.2.48.8.8.80x22e1Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)

                                                  DNS Answers

                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                  Apr 5, 2021 15:23:34.813111067 CEST8.8.8.8192.168.2.40xa1cdNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:23:40.222151041 CEST8.8.8.8192.168.2.40x3454No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:23:45.442692041 CEST8.8.8.8192.168.2.40x5ef3No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:24:07.292248011 CEST8.8.8.8192.168.2.40x903aNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:24:12.534817934 CEST8.8.8.8192.168.2.40x3c89No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:24:17.760065079 CEST8.8.8.8192.168.2.40xeb47No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:24:38.719062090 CEST8.8.8.8192.168.2.40xa70bNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:24:43.947593927 CEST8.8.8.8192.168.2.40xa719No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:24:49.197319984 CEST8.8.8.8192.168.2.40x6998No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                  Apr 5, 2021 15:25:10.058840036 CEST8.8.8.8192.168.2.40x22e1No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)

                                                  Code Manipulations

                                                  Statistics

                                                  Behavior

                                                  Click to jump to process

                                                  System Behavior

                                                  General

                                                  Start time:15:23:02
                                                  Start date:05/04/2021
                                                  Path:C:\Users\user\Desktop\Quotation_Request.pdf.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Users\user\Desktop\Quotation_Request.pdf.exe'
                                                  Imagebase:0xa50000
                                                  File size:763392 bytes
                                                  MD5 hash:79CD8383F51372C9F0721289F6470889
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.672015342.00000000040A0000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.672015342.00000000040A0000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.672015342.00000000040A0000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.671468034.0000000003DD9000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.671468034.0000000003DD9000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.671468034.0000000003DD9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  Reputation:low

                                                  General

                                                  Start time:15:23:13
                                                  Start date:05/04/2021
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\mgdPGGmBTUB' /XML 'C:\Users\user\AppData\Local\Temp\tmp4108.tmp'
                                                  Imagebase:0x830000
                                                  File size:185856 bytes
                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:15:23:13
                                                  Start date:05/04/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff724c50000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:15:23:14
                                                  Start date:05/04/2021
                                                  Path:C:\Users\user\Desktop\Quotation_Request.pdf.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:{path}
                                                  Imagebase:0xe80000
                                                  File size:763392 bytes
                                                  MD5 hash:79CD8383F51372C9F0721289F6470889
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.915585705.0000000004249000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.910440446.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.910440446.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.910440446.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.912659858.0000000003201000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.917484017.00000000058E0000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.917484017.00000000058E0000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.917702828.0000000005AB0000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.917702828.0000000005AB0000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.917702828.0000000005AB0000.00000004.00000001.sdmp, Author: Joe Security
                                                  Reputation:low

                                                  Disassembly

                                                  Code Analysis

                                                  Reset < >