Loading ...

Play interactive tourEdit tour

Analysis Report NEW_ORDER.pdf.exe

Overview

General Information

Sample Name:NEW_ORDER.pdf.exe
Analysis ID:382703
MD5:17bdd9b47882dfba3b0d800f94d7dbc1
SHA1:fba3196ceef380d49c18322ba1201b1afb9c9991
SHA256:5802e266beeabe10852b45ee17c86e9c7c8b62bc155848c809d3781e1b7a9123
Tags:exeNanoCore
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • NEW_ORDER.pdf.exe (PID: 7156 cmdline: 'C:\Users\user\Desktop\NEW_ORDER.pdf.exe' MD5: 17BDD9B47882DFBA3B0D800F94D7DBC1)
    • schtasks.exe (PID: 5124 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 5832 cmdline: {path} MD5: 2867A3817C9245F7CF518524DFD18F28)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Domain1": "185.140.53.138", "Domain2": "wealth2021.ddns.net", "Port": 20221, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xf7ad:$x1: NanoCore.ClientPluginHost
  • 0xf7da:$x2: IClientNetworkHost
00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xf7ad:$x2: NanoCore.ClientPluginHost
  • 0x10888:$s4: PipeCreated
  • 0xf7c7:$s5: IClientLoggingHost
00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 16 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      4.2.RegSvcs.exe.400000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      4.2.RegSvcs.exe.400000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      4.2.RegSvcs.exe.400000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        4.2.RegSvcs.exe.400000.0.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfef5:$a: NanoCore
        • 0xff05:$a: NanoCore
        • 0x10139:$a: NanoCore
        • 0x1014d:$a: NanoCore
        • 0x1018d:$a: NanoCore
        • 0xff54:$b: ClientPlugin
        • 0x10156:$b: ClientPlugin
        • 0x10196:$b: ClientPlugin
        • 0x1007b:$c: ProjectData
        • 0x10a82:$d: DESCrypto
        • 0x1844e:$e: KeepAlive
        • 0x1643c:$g: LogClientMessage
        • 0x12637:$i: get_Connected
        • 0x10db8:$j: #=q
        • 0x10de8:$j: #=q
        • 0x10e04:$j: #=q
        • 0x10e34:$j: #=q
        • 0x10e50:$j: #=q
        • 0x10e6c:$j: #=q
        • 0x10e9c:$j: #=q
        • 0x10eb8:$j: #=q
        4.2.RegSvcs.exe.5144629.9.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xb184:$x1: NanoCore.ClientPluginHost
        • 0xb1b1:$x2: IClientNetworkHost
        Click to see the 35 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 5832, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\NEW_ORDER.pdf.exe' , ParentImage: C:\Users\user\Desktop\NEW_ORDER.pdf.exe, ParentProcessId: 7156, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp', ProcessId: 5124

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Domain1": "185.140.53.138", "Domain2": "wealth2021.ddns.net", "Port": 20221, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\lmZfKRr.exeMetadefender: Detection: 13%Perma Link
        Source: C:\Users\user\AppData\Roaming\lmZfKRr.exeReversingLabs: Detection: 54%
        Multi AV Scanner detection for submitted fileShow sources
        Source: NEW_ORDER.pdf.exeMetadefender: Detection: 13%Perma Link
        Source: NEW_ORDER.pdf.exeReversingLabs: Detection: 46%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.905010283.0000000002981000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5832, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORY
        Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5144629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cff7c.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5140000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5140000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39d45a5.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cff7c.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3c9c0e0.2.raw.unpack, type: UNPACKEDPE
        Source: 4.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 4.2.RegSvcs.exe.5140000.8.unpackAvira: Label: TR/NanoCore.fadte
        Source: NEW_ORDER.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: NEW_ORDER.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: wealth2021.ddns.net
        Source: Malware configuration extractorURLs: 185.140.53.138
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: wealth2021.ddns.net
        Source: global trafficTCP traffic: 192.168.2.4:49727 -> 185.140.53.138:20221
        Source: Joe Sandbox ViewIP Address: 185.140.53.138 185.140.53.138
        Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
        Source: unknownDNS traffic detected: queries for: wealth2021.ddns.net
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: NEW_ORDER.pdf.exeString found in binary or memory: http://www.efg2.com/Lab/Library/ImageProcessing/DHALF.TXT
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: NEW_ORDER.pdf.exeString found in binary or memory: http://www.tannerhelland.com/4660/dithering-eleven-algorithms-source-code/
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: NEW_ORDER.pdf.exeString found in binary or memory: https://github.com/Whiplash141/Whips-Image-Converter/releases/latest
        Source: NEW_ORDER.pdf.exeString found in binary or memory: https://stackoverflow.com/questions/5940188/how-to-convert-a-24-bit-png-to-3-bit-png-using-floyd-ste
        Source: RegSvcs.exe, 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.905010283.0000000002981000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5832, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORY
        Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5144629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cff7c.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5140000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5140000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39d45a5.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cff7c.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3c9c0e0.2.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.908094344.0000000005130000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: RegSvcs.exe PID: 5832, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: RegSvcs.exe PID: 5832, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.RegSvcs.exe.5144629.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.RegSvcs.exe.39cff7c.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.5130000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.RegSvcs.exe.5140000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.5140000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.29b4920.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.39d45a5.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.39cff7c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.NEW_ORDER.pdf.exe.3c9c0e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.NEW_ORDER.pdf.exe.3c9c0e0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: NEW_ORDER.pdf.exe
        Source: initial sampleStatic PE information: Filename: NEW_ORDER.pdf.exe
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0298A298
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02980A50
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029863D0
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02980040
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02981980
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02988EC8
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0298C50C
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0298A288
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02983A38
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02983A29
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02980A41
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029833B1
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029833C0
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029863C2
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02984080
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02981880
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029868D0
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02980006
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02981854
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0298407A
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0298F1C8
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02983E90
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02988EB7
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02983EA0
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02989F10
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02989F02
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02983C58
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02983C49
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02985445
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02985468
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0298A530
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0298A520
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F7B6F0
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F74988
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F7B6E0
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F75258
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F7524B
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F76CD4
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F76CD1
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F72E14
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_006279C1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_027DE471
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_027DE480
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_027DBBD4
        Source: NEW_ORDER.pdf.exeBinary or memory string: OriginalFilename vs NEW_ORDER.pdf.exe
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665616120.000000000F530000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs NEW_ORDER.pdf.exe
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665854825.000000000F620000.00000002.00000001.sdmpBinary or memory string: originalfilename vs NEW_ORDER.pdf.exe
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665854825.000000000F620000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs NEW_ORDER.pdf.exe
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.657260140.00000000029F1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMetroFramework.dll> vs NEW_ORDER.pdf.exe
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.659038115.0000000004326000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs NEW_ORDER.pdf.exe
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamey~ vs NEW_ORDER.pdf.exe
        Source: NEW_ORDER.pdf.exeBinary or memory string: OriginalFilenamey~ vs NEW_ORDER.pdf.exe
        Source: NEW_ORDER.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.908094344.0000000005130000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.908094344.0000000005130000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: RegSvcs.exe PID: 5832, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: RegSvcs.exe PID: 5832, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.RegSvcs.exe.5144629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.5144629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.RegSvcs.exe.39cff7c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.39cff7c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.5130000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.5130000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.RegSvcs.exe.5140000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.5140000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.5140000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.5140000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.29b4920.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.29b4920.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.39d45a5.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.39d45a5.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.39cff7c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.39cff7c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.NEW_ORDER.pdf.exe.3c9c0e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.NEW_ORDER.pdf.exe.3c9c0e0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: NEW_ORDER.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: lmZfKRr.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@6/4@11/1
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile created: C:\Users\user\AppData\Roaming\lmZfKRr.exeJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5720:120:WilError_01
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\NjUgKeijLA
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{ae697278-0563-480d-a326-4f0ab2164ba0}
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmp53CF.tmpJump to behavior
        Source: NEW_ORDER.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: NEW_ORDER.pdf.exeMetadefender: Detection: 13%
        Source: NEW_ORDER.pdf.exeReversingLabs: Detection: 46%
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile read: C:\Users\user\Desktop\NEW_ORDER.pdf.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\NEW_ORDER.pdf.exe 'C:\Users\user\Desktop\NEW_ORDER.pdf.exe'
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp'
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: NEW_ORDER.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: NEW_ORDER.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Data Obfuscation:

        barindex
        .NET source code contains method to dynamically call methods (often used by packers)Show sources
        Source: NEW_ORDER.pdf.exe, SqlFormatter/Graham_And_Jarvis.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: lmZfKRr.exe.0.dr, SqlFormatter/Graham_And_Jarvis.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 0.0.NEW_ORDER.pdf.exe.620000.0.unpack, SqlFormatter/Graham_And_Jarvis.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 0.2.NEW_ORDER.pdf.exe.620000.0.unpack, SqlFormatter/Graham_And_Jarvis.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
        .NET source code contains potential unpackerShow sources
        Source: NEW_ORDER.pdf.exe, SqlFormatter/Graham_And_Jarvis.cs.Net Code: sssss System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: lmZfKRr.exe.0.dr, SqlFormatter/Graham_And_Jarvis.cs.Net Code: sssss System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.NEW_ORDER.pdf.exe.620000.0.unpack, SqlFormatter/Graham_And_Jarvis.cs.Net Code: sssss System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.NEW_ORDER.pdf.exe.620000.0.unpack, SqlFormatter/Graham_And_Jarvis.cs.Net Code: sssss System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F7304A push eax; retf
        Source: initial sampleStatic PE information: section name: .text entropy: 7.88331546414
        Source: initial sampleStatic PE information: section name: .text entropy: 7.88331546414
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile created: C:\Users\user\AppData\Roaming\lmZfKRr.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Uses an obfuscated file name to hide its real file extension (double extension)Show sources
        Source: Possible double extension: pdf.exeStatic PE information: NEW_ORDER.pdf.exe
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1967
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7696
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: foregroundWindowGot 984
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exe TID: 7160Thread sleep time: -31500s >= -30000s
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exe TID: 2936Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeThread delayed: delay time: 31500
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
        Source: RegSvcs.exe, 00000004.00000002.908885476.0000000006380000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: RegSvcs.exe, 00000004.00000002.908885476.0000000006380000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: RegSvcs.exe, 00000004.00000002.908885476.0000000006380000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: RegSvcs.exe, 00000004.00000002.904487447.0000000000B6D000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: RegSvcs.exe, 00000004.00000002.908885476.0000000006380000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 420000
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 422000
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 600008
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp'
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
        Source: RegSvcs.exe, 00000004.00000002.905070575.00000000029F3000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: RegSvcs.exe, 00000004.00000002.905070575.00000000029F3000.00000004.00000001.sdmpBinary or memory string: Program Managerd
        Source: RegSvcs.exe, 00000004.00000002.904625704.0000000001280000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: RegSvcs.exe, 00000004.00000002.904625704.0000000001280000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: RegSvcs.exe, 00000004.00000002.904526080.0000000000E8E000.00000004.00000010.sdmpBinary or memory string: Program ManagerlZ
        Source: RegSvcs.exe, 00000004.00000002.908544176.0000000005B3C000.00000004.00000001.sdmpBinary or memory string: Program Managerl
        Source: RegSvcs.exe, 00000004.00000002.905070575.00000000029F3000.00000004.00000001.sdmpBinary or memory string: Program Managerx
        Source: RegSvcs.exe, 00000004.00000002.904625704.0000000001280000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Users\user\Desktop\NEW_ORDER.pdf.exe VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.905010283.0000000002981000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5832, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORY
        Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5144629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cff7c.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5140000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5140000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39d45a5.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cff7c.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3c9c0e0.2.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000004.00000002.905010283.0000000002981000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.905010283.0000000002981000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5832, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORY
        Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5144629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cff7c.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5140000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5140000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39d45a5.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cff7c.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3c9c0e0.2.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection212Masquerading11Input Capture11Security Software Discovery211Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection212NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information12Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing23DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        NEW_ORDER.pdf.exe19%MetadefenderBrowse
        NEW_ORDER.pdf.exe47%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\lmZfKRr.exe19%MetadefenderBrowse
        C:\Users\user\AppData\Roaming\lmZfKRr.exe54%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        4.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        4.2.RegSvcs.exe.5140000.8.unpack100%AviraTR/NanoCore.fadteDownload File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        wealth2021.ddns.net0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        185.140.53.1380%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        wealth2021.ddns.net
        185.140.53.138
        truetrue
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          wealth2021.ddns.nettrue
          • Avira URL Cloud: safe
          unknown
          185.140.53.138true
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
            high
            http://www.fontbureau.comNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
              high
              http://www.fontbureau.com/designersGNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                high
                http://www.fontbureau.com/designers/?NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                    high
                    http://www.tiro.comNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                      high
                      http://www.goodfont.co.krNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/cTheNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-user.htmlNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/DPleaseNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.tannerhelland.com/4660/dithering-eleven-algorithms-source-code/NEW_ORDER.pdf.exefalse
                            high
                            http://www.fontbureau.com/designers8NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                              high
                              https://github.com/Whiplash141/Whips-Image-Converter/releases/latestNEW_ORDER.pdf.exefalse
                                high
                                http://www.fonts.comNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.sandoll.co.krNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  https://stackoverflow.com/questions/5940188/how-to-convert-a-24-bit-png-to-3-bit-png-using-floyd-steNEW_ORDER.pdf.exefalse
                                    high
                                    http://www.efg2.com/Lab/Library/ImageProcessing/DHALF.TXTNEW_ORDER.pdf.exefalse
                                      high
                                      http://www.urwpp.deDPleaseNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.zhongyicts.com.cnNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameNEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.sakkal.comNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown

                                        Contacted IPs

                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs

                                        Public

                                        IPDomainCountryFlagASNASN NameMalicious
                                        185.140.53.138
                                        wealth2021.ddns.netSweden
                                        209623DAVID_CRAIGGGtrue

                                        General Information

                                        Joe Sandbox Version:31.0.0 Emerald
                                        Analysis ID:382703
                                        Start date:06.04.2021
                                        Start time:14:57:10
                                        Joe Sandbox Product:CloudBasic
                                        Overall analysis duration:0h 7m 17s
                                        Hypervisor based Inspection enabled:false
                                        Report type:light
                                        Sample file name:NEW_ORDER.pdf.exe
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                        Number of analysed new started processes analysed:19
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • HDC enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Detection:MAL
                                        Classification:mal100.troj.evad.winEXE@6/4@11/1
                                        EGA Information:Failed
                                        HDC Information:
                                        • Successful, ratio: 0% (good quality ratio 0%)
                                        • Quality average: 85%
                                        • Quality standard deviation: 17.6%
                                        HCA Information:
                                        • Successful, ratio: 99%
                                        • Number of executed functions: 0
                                        • Number of non-executed functions: 0
                                        Cookbook Comments:
                                        • Adjust boot time
                                        • Enable AMSI
                                        • Found application associated with file extension: .exe
                                        Warnings:
                                        Show All
                                        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                        • TCP Packets have been reduced to 100
                                        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                        • Excluded IPs from analysis (whitelisted): 13.107.246.254, 104.43.193.48, 52.147.198.201, 20.82.209.183, 92.122.213.194, 92.122.213.247, 13.88.21.125, 52.155.217.156, 20.54.26.129, 2.20.142.209, 2.20.142.210, 20.82.210.154, 52.255.188.83, 20.50.102.62
                                        • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, t-ring.msedge.net, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, t-9999.t-msedge.net, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, t-ring.t-9999.t-msedge.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • VT rate limit hit for: /opt/package/joesandbox/database/analysis/382703/sample/NEW_ORDER.pdf.exe

                                        Simulations

                                        Behavior and APIs

                                        TimeTypeDescription
                                        14:57:58API Interceptor2x Sleep call for process: NEW_ORDER.pdf.exe modified

                                        Joe Sandbox View / Context

                                        IPs

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        185.140.53.138Quotation_Request.pdf.exeGet hashmaliciousBrowse
                                          URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                            Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                              1PH37n4Gva.exeGet hashmaliciousBrowse
                                                35dbds3GQG.exeGet hashmaliciousBrowse
                                                  QXJGE2LOdP.exeGet hashmaliciousBrowse
                                                    O4m3hDFNbh.exeGet hashmaliciousBrowse
                                                      nrv_remittance#U007eorder#U007epayment.exeGet hashmaliciousBrowse
                                                        NEW ORDER REQUEST_EXPORT005JKL DOC.exeGet hashmaliciousBrowse
                                                          WIRE COPY ORDER T104484_PP.exeGet hashmaliciousBrowse
                                                            71AXBkD1wA.exeGet hashmaliciousBrowse

                                                              Domains

                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                              wealth2021.ddns.netQuotation_Request.pdf.exeGet hashmaliciousBrowse
                                                              • 185.140.53.138
                                                              URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                                              • 185.140.53.138
                                                              Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                                              • 185.140.53.138

                                                              ASN

                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                              DAVID_CRAIGGGDoc_58YJ54-521DERG701-55YH701.exeGet hashmaliciousBrowse
                                                              • 185.140.53.230
                                                              Quotation_Request.pdf.exeGet hashmaliciousBrowse
                                                              • 185.140.53.138
                                                              FRQ_05694 revised quantity.exeGet hashmaliciousBrowse
                                                              • 185.140.53.69
                                                              INVOICE 15112021.xlsxGet hashmaliciousBrowse
                                                              • 185.140.53.130
                                                              URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                                              • 185.140.53.138
                                                              IMG-001982-AW00173-SSE73I.exeGet hashmaliciousBrowse
                                                              • 185.140.53.230
                                                              FYI-Orderimg.exeGet hashmaliciousBrowse
                                                              • 185.140.53.67
                                                              Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                                              • 185.140.53.138
                                                              PO-94765809570-Order pdf.exeGet hashmaliciousBrowse
                                                              • 185.140.53.7
                                                              Commercial E-invoice.exeGet hashmaliciousBrowse
                                                              • 185.140.53.137
                                                              Order23032021.xlsGet hashmaliciousBrowse
                                                              • 185.140.53.130
                                                              ZcQwvgqtuQ.exeGet hashmaliciousBrowse
                                                              • 91.193.75.245
                                                              lKIPqaYkKB.exeGet hashmaliciousBrowse
                                                              • 185.140.53.161
                                                              t5R60D503x.exeGet hashmaliciousBrowse
                                                              • 185.140.53.9
                                                              Purchase OrderDated19032021.xlsGet hashmaliciousBrowse
                                                              • 185.140.53.130
                                                              0u1JLpIwRo.exeGet hashmaliciousBrowse
                                                              • 185.140.53.139
                                                              PO-21322.xlsmGet hashmaliciousBrowse
                                                              • 185.165.153.116
                                                              GT_0397337_03987638BNG.exeGet hashmaliciousBrowse
                                                              • 185.140.53.9
                                                              5woB0vy0X6.exeGet hashmaliciousBrowse
                                                              • 185.140.53.139
                                                              Doc_IMAGE-587HTY-9545-55401.exeGet hashmaliciousBrowse
                                                              • 185.140.53.230

                                                              JA3 Fingerprints

                                                              No context

                                                              Dropped Files

                                                              No context

                                                              Created / dropped Files

                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NEW_ORDER.pdf.exe.log
                                                              Process:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1216
                                                              Entropy (8bit):5.355304211458859
                                                              Encrypted:false
                                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                              MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                              Malicious:true
                                                              Reputation:high, very likely benign file
                                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                              C:\Users\user\AppData\Local\Temp\tmp53CF.tmp
                                                              Process:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1640
                                                              Entropy (8bit):5.176392077301857
                                                              Encrypted:false
                                                              SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGCaItn:cbhK79lNQR/rydbz9I3YODOLNdq3Z
                                                              MD5:39E567FE518CA8EDB0AD37D54E7A6104
                                                              SHA1:59C9DFBF1A6CB4EF179AE5B8FFBB37DE4571A5EE
                                                              SHA-256:78F5BB3FDBB676F649A6165362193FF71DA638D9021B8AD8DC464C891EC84A42
                                                              SHA-512:0A1E9A361C3F2FD0F0324A07F631E51830E4398D201798CA69A4112EABB88E37D1E2EB4C51B3E5D1D6CB7715F8901C6A3E551B730831D8C70C1C356EBA7B7633
                                                              Malicious:true
                                                              Reputation:low
                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              File Type:Non-ISO extended-ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):8
                                                              Entropy (8bit):3.0
                                                              Encrypted:false
                                                              SSDEEP:3:f7/t:Tl
                                                              MD5:BA96EE5A0ADF7C7F588EAADA2E18CF3A
                                                              SHA1:9F751596B956F6C75FD2E4F447979A0DDB859F08
                                                              SHA-256:9D3F3D537AE6BDBD90E1CA94DCA09925A05D9CE84EA9FB0605F19BDF8676EFC1
                                                              SHA-512:7EEBED8E803D20FB77A11215F5AE9B1070FA9F169A4021E4F38ADB14D082B4CA3EE6C8948028F0AD58DE8E1231E01749C0088F861EFA5CA5C905DB1E61DBBD05
                                                              Malicious:true
                                                              Reputation:low
                                                              Preview: .....H
                                                              C:\Users\user\AppData\Roaming\lmZfKRr.exe
                                                              Process:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):812032
                                                              Entropy (8bit):7.87719204655292
                                                              Encrypted:false
                                                              SSDEEP:12288:6ofCEqJj8Sm2zaxyc8fIJ34zphf/ctoaTTrkY0tt7T4tWAOFNViq78PcuYl:6oaEqRMyVfI8n3gT4JbY8Ji2M
                                                              MD5:17BDD9B47882DFBA3B0D800F94D7DBC1
                                                              SHA1:FBA3196CEEF380D49C18322BA1201B1AFB9C9991
                                                              SHA-256:5802E266BEEABE10852B45EE17C86E9C7C8B62BC155848C809D3781E1B7A9123
                                                              SHA-512:5518F9FED2B8CBC3885954A30ADCB8756CED23EFF41C53A3F3DAEAD31F83169A84BD21E6636AA632A18E735B9519F25EA845370E382F7F92C0C4DFB360EE08F3
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Metadefender, Detection: 19%, Browse
                                                              • Antivirus: ReversingLabs, Detection: 54%
                                                              Reputation:low
                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....k`..............0..Z..........^v... ........@.. ....................................@..................................v..O.................................................................................... ............... ..H............text....X... ...Z.................. ..`.rsrc................\..............@..@.reloc...............b..............@..B................@v......H........................................................................0...........r...p.+..*..0...........r...p.+..*".(.....*.0..G..........}......}......}..... ....}..... .....(......b`.(.....b`.(....`}....*..0..D..........}......}......}.......}..... .....(......b`.(.....b`.(....`}....*.0..+........... ........,.. ......+.......,.......+..*..0..>.........{.....{....Y(.....{.....{....Y(....X.{.....{....Y(....X.+..*...0............{....(.....+..*....0............".....(...

                                                              Static File Info

                                                              General

                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Entropy (8bit):7.87719204655292
                                                              TrID:
                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                              • Windows Screen Saver (13104/52) 0.07%
                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                              File name:NEW_ORDER.pdf.exe
                                                              File size:812032
                                                              MD5:17bdd9b47882dfba3b0d800f94d7dbc1
                                                              SHA1:fba3196ceef380d49c18322ba1201b1afb9c9991
                                                              SHA256:5802e266beeabe10852b45ee17c86e9c7c8b62bc155848c809d3781e1b7a9123
                                                              SHA512:5518f9fed2b8cbc3885954a30adcb8756ced23eff41c53a3f3daead31f83169a84bd21e6636aa632a18e735b9519f25ea845370e382f7f92c0c4dfb360ee08f3
                                                              SSDEEP:12288:6ofCEqJj8Sm2zaxyc8fIJ34zphf/ctoaTTrkY0tt7T4tWAOFNViq78PcuYl:6oaEqRMyVfI8n3gT4JbY8Ji2M
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....k`..............0..Z..........^v... ........@.. ....................................@................................

                                                              File Icon

                                                              Icon Hash:00828e8e8686b000

                                                              Static PE Info

                                                              General

                                                              Entrypoint:0x4c765e
                                                              Entrypoint Section:.text
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                              Time Stamp:0x606B83FC [Mon Apr 5 21:41:16 2021 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:v4.0.30319
                                                              OS Version Major:4
                                                              OS Version Minor:0
                                                              File Version Major:4
                                                              File Version Minor:0
                                                              Subsystem Version Major:4
                                                              Subsystem Version Minor:0
                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                              Entrypoint Preview

                                                              Instruction
                                                              jmp dword ptr [00402000h]
                                                              add eax, 00000000h
                                                              add byte ptr [eax], al
                                                              add byte ptr [ecx], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [ebx], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [edx], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [edx], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [ecx], al
                                                              add byte ptr [eax], al
                                                              add dh, bh

                                                              Data Directories

                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xc760c0x4f.text
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x5ac.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xca0000xc.reloc
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                              Sections

                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x20000xc58ac0xc5a00False0.899721052736data7.88331546414IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                              .rsrc0xc80000x5ac0x600False0.424479166667data4.11601272417IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0xca0000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                              Resources

                                                              NameRVASizeTypeLanguageCountry
                                                              RT_VERSION0xc80900x31cdata
                                                              RT_MANIFEST0xc83bc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                              Imports

                                                              DLLImport
                                                              mscoree.dll_CorExeMain

                                                              Version Infos

                                                              DescriptionData
                                                              Translation0x0000 0x04b0
                                                              LegalCopyrightCopyright 2014
                                                              Assembly Version1.0.0.0
                                                              InternalNamey.exe
                                                              FileVersion1.0.0.0
                                                              CompanyName
                                                              LegalTrademarks
                                                              Comments
                                                              ProductNameSqlFormatter
                                                              ProductVersion1.0.0.0
                                                              FileDescriptionSqlFormatter
                                                              OriginalFilenamey.exe

                                                              Network Behavior

                                                              Network Port Distribution

                                                              TCP Packets

                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Apr 6, 2021 14:58:05.147273064 CEST4972720221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:05.193897009 CEST2022149727185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:05.705436945 CEST4972720221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:05.753998041 CEST2022149727185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:06.268091917 CEST4972720221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:06.314373970 CEST2022149727185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:10.430963039 CEST4973020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:10.478168011 CEST2022149730185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:10.986983061 CEST4973020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:11.034450054 CEST2022149730185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:11.549582005 CEST4973020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:11.597069025 CEST2022149730185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:15.614948034 CEST4973220221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:15.662126064 CEST2022149732185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:16.174989939 CEST4973220221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:16.220699072 CEST2022149732185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:16.721911907 CEST4973220221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:16.768621922 CEST2022149732185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:20.933881998 CEST4973620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:20.979547977 CEST2022149736185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:21.487879992 CEST4973620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:21.533593893 CEST2022149736185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:22.034960985 CEST4973620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:22.080630064 CEST2022149736185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:26.146341085 CEST4973820221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:26.192018032 CEST2022149738185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:26.707721949 CEST4973820221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:26.753480911 CEST2022149738185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:27.254050016 CEST4973820221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:27.299705029 CEST2022149738185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:31.387415886 CEST4974020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:31.433103085 CEST2022149740185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:31.941874981 CEST4974020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:31.988670111 CEST2022149740185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:32.488835096 CEST4974020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:32.536633968 CEST2022149740185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:36.553973913 CEST4974620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:36.599664927 CEST2022149746185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:37.114222050 CEST4974620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:37.159900904 CEST2022149746185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:37.661113977 CEST4974620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:37.706602097 CEST2022149746185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:41.710304022 CEST4975320221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:41.757996082 CEST2022149753185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:42.270863056 CEST4975320221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:42.317116022 CEST2022149753185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:42.817785978 CEST4975320221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:42.865220070 CEST2022149753185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:46.885031939 CEST4975620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:46.933924913 CEST2022149756185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:47.443211079 CEST4975620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:47.488663912 CEST2022149756185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:47.990066051 CEST4975620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:48.035806894 CEST2022149756185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:52.108846903 CEST4976020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:52.154328108 CEST2022149760185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:52.662341118 CEST4976020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:52.708293915 CEST2022149760185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:53.225085974 CEST4976020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:53.270534039 CEST2022149760185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:57.388636112 CEST4976920221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:57.434137106 CEST2022149769185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:57.944029093 CEST4976920221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:57.989775896 CEST2022149769185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:58.490963936 CEST4976920221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:58.536823988 CEST2022149769185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:02.606455088 CEST4977020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:02.652405977 CEST2022149770185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:03.163347006 CEST4977020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:03.209135056 CEST2022149770185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:03.710362911 CEST4977020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:03.757666111 CEST2022149770185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:07.778412104 CEST4977220221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:07.863007069 CEST2022149772185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:08.366944075 CEST4977220221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:08.412867069 CEST2022149772185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:08.913778067 CEST4977220221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:08.960371971 CEST2022149772185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:12.979665041 CEST4977420221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:13.025278091 CEST2022149774185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:13.539076090 CEST4977420221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:13.586205006 CEST2022149774185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:14.085994959 CEST4977420221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:14.133135080 CEST2022149774185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:18.151887894 CEST4977820221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:18.197343111 CEST2022149778185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:18.711524010 CEST4977820221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:18.757230997 CEST2022149778185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:19.258344889 CEST4977820221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:19.304474115 CEST2022149778185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:23.446026087 CEST4978020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:23.491497993 CEST2022149780185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:23.993082047 CEST4978020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:24.038691044 CEST2022149780185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:24.540031910 CEST4978020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:24.588740110 CEST2022149780185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:28.667238951 CEST4978520221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:28.712775946 CEST2022149785185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:29.227895021 CEST4978520221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:29.277070045 CEST2022149785185.140.53.138192.168.2.4

                                                              UDP Packets

                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Apr 6, 2021 14:57:46.748694897 CEST53530978.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:07.602477074 CEST4925753192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:07.648535967 CEST53492578.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:09.684362888 CEST6238953192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:09.741121054 CEST53623898.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:11.050416946 CEST4991053192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:11.096380949 CEST53499108.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:17.354785919 CEST5585453192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:17.401576042 CEST53558548.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:18.336270094 CEST6454953192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:18.383507967 CEST53645498.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:20.874919891 CEST6315353192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:20.931477070 CEST53631538.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:21.728527069 CEST5299153192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:21.788741112 CEST53529918.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:26.085705042 CEST5370053192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:26.144759893 CEST53537008.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:28.425663948 CEST5172653192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:28.471601009 CEST53517268.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:31.320842028 CEST5679453192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:31.377226114 CEST53567948.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:34.628859043 CEST5653453192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:34.702776909 CEST53565348.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:35.198931932 CEST5662753192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:35.253509998 CEST53566278.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:35.688895941 CEST5662153192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:35.747694016 CEST53566218.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:35.822873116 CEST6311653192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:35.887654066 CEST53631168.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:36.201570988 CEST6407853192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:36.256244898 CEST53640788.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:36.819554090 CEST6480153192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:36.876899958 CEST53648018.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:37.470235109 CEST6172153192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:37.533876896 CEST53617218.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:38.127764940 CEST5125553192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:38.361290932 CEST53512558.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:39.233196974 CEST6152253192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:39.367219925 CEST53615228.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:40.333481073 CEST5233753192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:40.387959003 CEST53523378.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:40.933494091 CEST5504653192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:40.989588976 CEST53550468.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:42.355596066 CEST4961253192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:42.410073042 CEST53496128.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:46.368907928 CEST4928553192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:46.415062904 CEST53492858.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:47.166907072 CEST5060153192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:47.217428923 CEST53506018.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:48.060162067 CEST6087553192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:48.107306004 CEST53608758.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:49.156021118 CEST5644853192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:49.215174913 CEST53564488.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:52.061729908 CEST5917253192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:52.107770920 CEST53591728.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:52.903748989 CEST6242053192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:52.953758955 CEST53624208.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:53.029941082 CEST6057953192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:53.099467039 CEST53605798.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:55.085230112 CEST5018353192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:55.142219067 CEST53501838.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:57.291249037 CEST6153153192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:57.350332975 CEST53615318.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:02.557887077 CEST4922853192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:02.604027987 CEST53492288.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:03.820203066 CEST5979453192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:03.866555929 CEST53597948.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:11.376476049 CEST5591653192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:11.423827887 CEST53559168.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:16.137386084 CEST5275253192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:16.183969975 CEST53527528.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:16.904125929 CEST6054253192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:16.952917099 CEST53605428.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:17.676310062 CEST6068953192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:17.722225904 CEST53606898.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:18.516988993 CEST6420653192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:18.563946962 CEST53642068.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:23.389594078 CEST5090453192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:23.444430113 CEST53509048.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:23.781377077 CEST5752553192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:23.827682972 CEST53575258.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:24.987293959 CEST5381453192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:25.033330917 CEST53538148.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:26.107867002 CEST5341853192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:26.159982920 CEST53534188.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:27.300051928 CEST6283353192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:27.346029997 CEST53628338.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:28.606669903 CEST5926053192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:28.665932894 CEST53592608.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:29.426521063 CEST4994453192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:29.473968029 CEST53499448.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:31.196513891 CEST6330053192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:31.255347013 CEST53633008.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:33.841094971 CEST6144953192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:33.897640944 CEST53614498.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:54.621431112 CEST5127553192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:54.680380106 CEST53512758.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:59.856945038 CEST6349253192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:59.913978100 CEST53634928.8.8.8192.168.2.4

                                                              DNS Queries

                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                              Apr 6, 2021 14:58:20.874919891 CEST192.168.2.48.8.8.80x41c0Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:58:26.085705042 CEST192.168.2.48.8.8.80xc9afStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:58:31.320842028 CEST192.168.2.48.8.8.80xb36bStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:58:52.061729908 CEST192.168.2.48.8.8.80x5b64Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:58:57.291249037 CEST192.168.2.48.8.8.80xfb07Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:02.557887077 CEST192.168.2.48.8.8.80xa550Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:23.389594078 CEST192.168.2.48.8.8.80x2ee3Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:28.606669903 CEST192.168.2.48.8.8.80x2cfbStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:33.841094971 CEST192.168.2.48.8.8.80x9973Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:54.621431112 CEST192.168.2.48.8.8.80x29f2Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:59.856945038 CEST192.168.2.48.8.8.80xb40cStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)

                                                              DNS Answers

                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                              Apr 6, 2021 14:58:20.931477070 CEST8.8.8.8192.168.2.40x41c0No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:58:26.144759893 CEST8.8.8.8192.168.2.40xc9afNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:58:31.377226114 CEST8.8.8.8192.168.2.40xb36bNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:58:52.107770920 CEST8.8.8.8192.168.2.40x5b64No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:58:57.350332975 CEST8.8.8.8192.168.2.40xfb07No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:02.604027987 CEST8.8.8.8192.168.2.40xa550No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:23.444430113 CEST8.8.8.8192.168.2.40x2ee3No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:28.665932894 CEST8.8.8.8192.168.2.40x2cfbNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:33.897640944 CEST8.8.8.8192.168.2.40x9973No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:54.680380106 CEST8.8.8.8192.168.2.40x29f2No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:59.913978100 CEST8.8.8.8192.168.2.40xb40cNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)

                                                              Code Manipulations

                                                              Statistics

                                                              Behavior

                                                              Click to jump to process

                                                              System Behavior

                                                              General

                                                              Start time:14:57:53
                                                              Start date:06/04/2021
                                                              Path:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:'C:\Users\user\Desktop\NEW_ORDER.pdf.exe'
                                                              Imagebase:0x620000
                                                              File size:812032 bytes
                                                              MD5 hash:17BDD9B47882DFBA3B0D800F94D7DBC1
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:.Net C# or VB.NET
                                                              Yara matches:
                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, Author: Joe Security
                                                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                              Reputation:low

                                                              General

                                                              Start time:14:58:01
                                                              Start date:06/04/2021
                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp'
                                                              Imagebase:0x1330000
                                                              File size:185856 bytes
                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              General

                                                              Start time:14:58:01
                                                              Start date:06/04/2021
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff724c50000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              General

                                                              Start time:14:58:01
                                                              Start date:06/04/2021
                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:{path}
                                                              Imagebase:0x460000
                                                              File size:45152 bytes
                                                              MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:.Net C# or VB.NET
                                                              Yara matches:
                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, Author: Joe Security
                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                              • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.908094344.0000000005130000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.908094344.0000000005130000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.905010283.0000000002981000.00000004.00000001.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmp, Author: Joe Security
                                                              • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                              Reputation:high

                                                              Disassembly

                                                              Code Analysis

                                                              Reset < >