Loading ...

Play interactive tourEdit tour

Analysis Report note-mxm.exe

Overview

General Information

Sample Name:note-mxm.exe
Analysis ID:402865
MD5:116db2200d9be33529615fc98907d4d8
SHA1:29cf6588682aca66c59e41e0517ede00c75cc76d
SHA256:43bc7ada65633263e408152d7b117de464c9d23b2758d96a6822bde9ad27b170
Tags:exe
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AntiVM3
Yara detected Nanocore RAT
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

Startup

  • System is w10x64
  • note-mxm.exe (PID: 6860 cmdline: 'C:\Users\user\Desktop\note-mxm.exe' MD5: 116DB2200D9BE33529615FC98907D4D8)
    • schtasks.exe (PID: 7064 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\fGAhpbrTQZcHeY' /XML 'C:\Users\user\AppData\Local\Temp\tmp943B.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • note-mxm.exe (PID: 7120 cmdline: C:\Users\user\Desktop\note-mxm.exe MD5: 116DB2200D9BE33529615FC98907D4D8)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "cbea22e5-f897-4039-a352-cfbfd96f", "Group": "chase1", "Domain1": "45.137.22.50", "Domain2": "127.0.0.1", "Port": 4557, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x11e25d:$x1: NanoCore.ClientPluginHost
  • 0x150a7d:$x1: NanoCore.ClientPluginHost
  • 0x11e29a:$x2: IClientNetworkHost
  • 0x150aba:$x2: IClientNetworkHost
  • 0x121dcd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0x1545ed:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x11dfc5:$a: NanoCore
    • 0x11dfd5:$a: NanoCore
    • 0x11e209:$a: NanoCore
    • 0x11e21d:$a: NanoCore
    • 0x11e25d:$a: NanoCore
    • 0x1507e5:$a: NanoCore
    • 0x1507f5:$a: NanoCore
    • 0x150a29:$a: NanoCore
    • 0x150a3d:$a: NanoCore
    • 0x150a7d:$a: NanoCore
    • 0x11e024:$b: ClientPlugin
    • 0x11e226:$b: ClientPlugin
    • 0x11e266:$b: ClientPlugin
    • 0x150844:$b: ClientPlugin
    • 0x150a46:$b: ClientPlugin
    • 0x150a86:$b: ClientPlugin
    • 0x11e14b:$c: ProjectData
    • 0x15096b:$c: ProjectData
    • 0x11eb52:$d: DESCrypto
    • 0x151372:$d: DESCrypto
    • 0x12651e:$e: KeepAlive
    00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      Process Memory Space: note-mxm.exe PID: 6860JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        0.2.note-mxm.exe.40870d0.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0x1018d:$x1: NanoCore.ClientPluginHost
        • 0x429ad:$x1: NanoCore.ClientPluginHost
        • 0x101ca:$x2: IClientNetworkHost
        • 0x429ea:$x2: IClientNetworkHost
        • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        • 0x4651d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        0.2.note-mxm.exe.40870d0.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xff05:$x1: NanoCore Client.exe
        • 0x42725:$x1: NanoCore Client.exe
        • 0x1018d:$x2: NanoCore.ClientPluginHost
        • 0x429ad:$x2: NanoCore.ClientPluginHost
        • 0x117c6:$s1: PluginCommand
        • 0x43fe6:$s1: PluginCommand
        • 0x117ba:$s2: FileCommand
        • 0x43fda:$s2: FileCommand
        • 0x1266b:$s3: PipeExists
        • 0x44e8b:$s3: PipeExists
        • 0x18422:$s4: PipeCreated
        • 0x4ac42:$s4: PipeCreated
        • 0x101b7:$s5: IClientLoggingHost
        • 0x429d7:$s5: IClientLoggingHost
        0.2.note-mxm.exe.40870d0.2.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          0.2.note-mxm.exe.40870d0.2.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
          • 0xfef5:$a: NanoCore
          • 0xff05:$a: NanoCore
          • 0x10139:$a: NanoCore
          • 0x1014d:$a: NanoCore
          • 0x1018d:$a: NanoCore
          • 0x42715:$a: NanoCore
          • 0x42725:$a: NanoCore
          • 0x42959:$a: NanoCore
          • 0x4296d:$a: NanoCore
          • 0x429ad:$a: NanoCore
          • 0xff54:$b: ClientPlugin
          • 0x10156:$b: ClientPlugin
          • 0x10196:$b: ClientPlugin
          • 0x42774:$b: ClientPlugin
          • 0x42976:$b: ClientPlugin
          • 0x429b6:$b: ClientPlugin
          • 0x1007b:$c: ProjectData
          • 0x4289b:$c: ProjectData
          • 0x10a82:$d: DESCrypto
          • 0x432a2:$d: DESCrypto
          • 0x1844e:$e: KeepAlive
          0.2.note-mxm.exe.40870d0.2.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xe38d:$x1: NanoCore.ClientPluginHost
          • 0xe3ca:$x2: IClientNetworkHost
          • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          Click to see the 3 entries

          Sigma Overview

          System Summary:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\note-mxm.exe, ProcessId: 7120, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
          Sigma detected: Scheduled temp file as task from temp locationShow sources
          Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\fGAhpbrTQZcHeY' /XML 'C:\Users\user\AppData\Local\Temp\tmp943B.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\fGAhpbrTQZcHeY' /XML 'C:\Users\user\AppData\Local\Temp\tmp943B.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\note-mxm.exe' , ParentImage: C:\Users\user\Desktop\note-mxm.exe, ParentProcessId: 6860, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\fGAhpbrTQZcHeY' /XML 'C:\Users\user\AppData\Local\Temp\tmp943B.tmp', ProcessId: 7064

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 0.2.note-mxm.exe.40870d0.2.raw.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "cbea22e5-f897-4039-a352-cfbfd96f", "Group": "chase1", "Domain1": "45.137.22.50", "Domain2": "127.0.0.1", "Port": 4557, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8"}
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Roaming\fGAhpbrTQZcHeY.exeMetadefender: Detection: 27%Perma Link
          Source: C:\Users\user\AppData\Roaming\fGAhpbrTQZcHeY.exeReversingLabs: Detection: 57%
          Multi AV Scanner detection for submitted fileShow sources
          Source: note-mxm.exeMetadefender: Detection: 27%Perma Link
          Source: note-mxm.exeReversingLabs: Detection: 57%
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0.2.note-mxm.exe.40870d0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.note-mxm.exe.40870d0.2.unpack, type: UNPACKEDPE
          Machine Learning detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Roaming\fGAhpbrTQZcHeY.exeJoe Sandbox ML: detected
          Machine Learning detection for sampleShow sources
          Source: note-mxm.exeJoe Sandbox ML: detected
          Source: note-mxm.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: note-mxm.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49742 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49747 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49748 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49751 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49753 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49754 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49758 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49768 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49769 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49775 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49776 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49777 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49778 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49779 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49781 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49783 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49784 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49785 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49786 -> 45.137.22.50:4557
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49787 -> 45.137.22.50:4557
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: 45.137.22.50
          Source: Malware configuration extractorURLs: 127.0.0.1
          Source: global trafficTCP traffic: 192.168.2.4:49742 -> 45.137.22.50:4557
          Source: Joe Sandbox ViewIP Address: 45.137.22.50 45.137.22.50
          Source: Joe Sandbox ViewASN Name: ROOTLAYERNETNL ROOTLAYERNETNL
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.50
          Source: note-mxm.exe, 00000000.00000002.670657533.0000000002F71000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
          Source: note-mxm.exe, 00000000.00000002.670401401.00000000013DA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

          E-Banking Fraud:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0.2.note-mxm.exe.40870d0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.note-mxm.exe.40870d0.2.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.note-mxm.exe.40870d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.note-mxm.exe.40870d0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.note-mxm.exe.40870d0.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.note-mxm.exe.40870d0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: C:\Users\user\Desktop\note-mxm.exeCode function: 0_2_00BD6C06
          Source: C:\Users\user\Desktop\note-mxm.exeCode function: 0_2_05536F68
          Source: C:\Users\user\Desktop\note-mxm.exeCode function: 0_2_055372F0
          Source: C:\Users\user\Desktop\note-mxm.exeCode function: 0_2_05538491
          Source: C:\Users\user\Desktop\note-mxm.exeCode function: 0_2_05538718
          Source: C:\Users\user\Desktop\note-mxm.exeCode function: 0_2_055383F0
          Source: C:\Users\user\Desktop\note-mxm.exeCode function: 0_2_0553EB38
          Source: C:\Users\user\Desktop\note-mxm.exeCode function: 0_2_0553D558
          Source: C:\Users\user\Desktop\note-mxm.exeCode function: 0_2_0553D548
          Source: C:\Users\user\Desktop\note-mxm.exeCode function: 0_2_05537348
          Source: C:\Users\user\Desktop\note-mxm.exeCode function: 0_2_0553738D
          Source: C:\Users\user\Desktop\note-mxm.exeCode function: 0_2_05537840
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\fGAhpbrTQZcHeY.exe 43BC7ADA65633263E408152D7B117DE464C9D23B2758D96A6822BDE9AD27B170
          Source: note-mxm.exe, 00000000.00000002.670586898.00000000014A9000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameSeekOrigin.exeP vs note-mxm.exe
          Source: note-mxm.exe, 00000000.00000002.672562684.000000000413E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs note-mxm.exe
          Source: note-mxm.exe, 00000000.00000002.676279917.000000000BF20000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs note-mxm.exe
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll( vs note-mxm.exe
          Source: note-mxm.exe, 00000000.00000002.670401401.00000000013DA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs note-mxm.exe
          Source: note-mxm.exe, 00000005.00000003.672190079.0000000006D32000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs note-mxm.exe
          Source: note-mxm.exe, 00000005.00000000.663314117.0000000000F02000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSeekOrigin.exeP vs note-mxm.exe
          Source: note-mxm.exeBinary or memory string: OriginalFilenameSeekOrigin.exeP vs note-mxm.exe
          Source: note-mxm.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: 00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.note-mxm.exe.40870d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.note-mxm.exe.40870d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.note-mxm.exe.40870d0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.note-mxm.exe.40870d0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.note-mxm.exe.40870d0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.note-mxm.exe.40870d0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: note-mxm.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: fGAhpbrTQZcHeY.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal100.troj.evad.winEXE@6/8@0/1
          Source: C:\Users\user\Desktop\note-mxm.exeFile created: C:\Users\user\AppData\Roaming\fGAhpbrTQZcHeY.exeJump to behavior
          Source: C:\Users\user\Desktop\note-mxm.exeMutant created: \Sessions\1\BaseNamedObjects\TiHcXXCDXKvJ
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7072:120:WilError_01
          Source: C:\Users\user\Desktop\note-mxm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{cbea22e5-f897-4039-a352-cfbfd96fa986}
          Source: C:\Users\user\Desktop\note-mxm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp943B.tmpJump to behavior
          Source: note-mxm.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\note-mxm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\note-mxm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\note-mxm.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\note-mxm.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
          Source: note-mxm.exeMetadefender: Detection: 27%
          Source: note-mxm.exeReversingLabs: Detection: 57%
          Source: C:\Users\user\Desktop\note-mxm.exeFile read: C:\Users\user\Desktop\note-mxm.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\note-mxm.exe 'C:\Users\user\Desktop\note-mxm.exe'
          Source: C:\Users\user\Desktop\note-mxm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\fGAhpbrTQZcHeY' /XML 'C:\Users\user\AppData\Local\Temp\tmp943B.tmp'
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\note-mxm.exeProcess created: C:\Users\user\Desktop\note-mxm.exe C:\Users\user\Desktop\note-mxm.exe
          Source: C:\Users\user\Desktop\note-mxm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\fGAhpbrTQZcHeY' /XML 'C:\Users\user\AppData\Local\Temp\tmp943B.tmp'
          Source: C:\Users\user\Desktop\note-mxm.exeProcess created: C:\Users\user\Desktop\note-mxm.exe C:\Users\user\Desktop\note-mxm.exe
          Source: C:\Users\user\Desktop\note-mxm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
          Source: C:\Users\user\Desktop\note-mxm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: note-mxm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: note-mxm.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: initial sampleStatic PE information: section name: .text entropy: 7.83711506914
          Source: initial sampleStatic PE information: section name: .text entropy: 7.83711506914
          Source: C:\Users\user\Desktop\note-mxm.exeFile created: C:\Users\user\AppData\Roaming\fGAhpbrTQZcHeY.exeJump to dropped file

          Boot Survival:

          barindex
          Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
          Source: C:\Users\user\Desktop\note-mxm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\fGAhpbrTQZcHeY' /XML 'C:\Users\user\AppData\Local\Temp\tmp943B.tmp'

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Users\user\Desktop\note-mxm.exeFile opened: C:\Users\user\Desktop\note-mxm.exe:Zone.Identifier read attributes | delete
          Source: C:\Users\user\Desktop\note-mxm.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: note-mxm.exe PID: 6860, type: MEMORY
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: C:\Users\user\Desktop\note-mxm.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\note-mxm.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\note-mxm.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\note-mxm.exeWindow / User API: threadDelayed 4610
          Source: C:\Users\user\Desktop\note-mxm.exeWindow / User API: threadDelayed 4454
          Source: C:\Users\user\Desktop\note-mxm.exeWindow / User API: foregroundWindowGot 637
          Source: C:\Users\user\Desktop\note-mxm.exeWindow / User API: foregroundWindowGot 782
          Source: C:\Users\user\Desktop\note-mxm.exe TID: 6864Thread sleep time: -99002s >= -30000s
          Source: C:\Users\user\Desktop\note-mxm.exe TID: 3840Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\note-mxm.exe TID: 6264Thread sleep time: -12912720851596678s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\note-mxm.exeThread delayed: delay time: 99002
          Source: C:\Users\user\Desktop\note-mxm.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\note-mxm.exeThread delayed: delay time: 922337203685477
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: C:\Users\user\Desktop\note-mxm.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\note-mxm.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\note-mxm.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\note-mxm.exeMemory allocated: page read and write | page guard
          Source: C:\Users\user\Desktop\note-mxm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\fGAhpbrTQZcHeY' /XML 'C:\Users\user\AppData\Local\Temp\tmp943B.tmp'
          Source: C:\Users\user\Desktop\note-mxm.exeProcess created: C:\Users\user\Desktop\note-mxm.exe C:\Users\user\Desktop\note-mxm.exe
          Source: C:\Users\user\Desktop\note-mxm.exeQueries volume information: C:\Users\user\Desktop\note-mxm.exe VolumeInformation
          Source: C:\Users\user\Desktop\note-mxm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\note-mxm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\note-mxm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\note-mxm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\note-mxm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
          Source: C:\Users\user\Desktop\note-mxm.exeQueries volume information: C:\Users\user\Desktop\note-mxm.exe VolumeInformation
          Source: C:\Users\user\Desktop\note-mxm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\note-mxm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\note-mxm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\note-mxm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\note-mxm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\Desktop\note-mxm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\note-mxm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

          Stealing of Sensitive Information:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0.2.note-mxm.exe.40870d0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.note-mxm.exe.40870d0.2.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Detected Nanocore RatShow sources
          Source: note-mxm.exe, 00000005.00000003.672190079.0000000006D32000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0.2.note-mxm.exe.40870d0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.note-mxm.exe.40870d0.2.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Process Injection11Masquerading1Input Capture1Query Registry1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemorySecurity Software Discovery221Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection11NTDSVirtualization/Sandbox Evasion31Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Files and Directories1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing2DCSyncSystem Information Discovery12Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          note-mxm.exe30%MetadefenderBrowse
          note-mxm.exe57%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
          note-mxm.exe100%Joe Sandbox ML

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\fGAhpbrTQZcHeY.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\fGAhpbrTQZcHeY.exe30%MetadefenderBrowse
          C:\Users\user\AppData\Roaming\fGAhpbrTQZcHeY.exe57%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

          Unpacked PE Files

          No Antivirus matches

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          45.137.22.500%Avira URL Cloudsafe
          127.0.0.10%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          No contacted domains info

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          45.137.22.50true
          • Avira URL Cloud: safe
          unknown
          127.0.0.1true
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namenote-mxm.exe, 00000000.00000002.670657533.0000000002F71000.00000004.00000001.sdmpfalse
            high
            https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssnote-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmpfalse
              high

              Contacted IPs

              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs

              Public

              IPDomainCountryFlagASNASN NameMalicious
              45.137.22.50
              unknownNetherlands
              51447ROOTLAYERNETNLtrue

              General Information

              Joe Sandbox Version:32.0.0 Black Diamond
              Analysis ID:402865
              Start date:03.05.2021
              Start time:15:06:57
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 7m 49s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:note-mxm.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:21
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@6/8@0/1
              EGA Information:Failed
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .exe
              Warnings:
              Show All
              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
              • TCP Packets have been reduced to 100
              • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: /opt/package/joesandbox/database/analysis/402865/sample/note-mxm.exe

              Simulations

              Behavior and APIs

              TimeTypeDescription
              15:07:49API Interceptor1037x Sleep call for process: note-mxm.exe modified

              Joe Sandbox View / Context

              IPs

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              45.137.22.50purchase order confirmation.exeGet hashmaliciousBrowse
                purchase order acknowledgement.exeGet hashmaliciousBrowse
                  TBBurmah Trading Co., Ltd - products inquiry .exeGet hashmaliciousBrowse
                    PURCHASE ORDER - #0022223 DATED 29042021.exeGet hashmaliciousBrowse
                      PURCHASE ORDER - #0022223, date29042021.exeGet hashmaliciousBrowse
                        B_N SAO SWIFT MT103.exeGet hashmaliciousBrowse
                          PURCHASE ORDER - #0022223 DATED 28042021.exeGet hashmaliciousBrowse
                            Al kabous group Ltd - purchase order #04272021.exeGet hashmaliciousBrowse
                              Mack Trading Limited - products list.exeGet hashmaliciousBrowse
                                Kim Quy Trading - PRODUCTS LISTS.exeGet hashmaliciousBrowse

                                  Domains

                                  No context

                                  ASN

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  ROOTLAYERNETNLpurchase order confirmation.exeGet hashmaliciousBrowse
                                  • 45.137.22.50
                                  purchase order acknowledgement.exeGet hashmaliciousBrowse
                                  • 45.137.22.50
                                  TBBurmah Trading Co., Ltd - products inquiry .exeGet hashmaliciousBrowse
                                  • 45.137.22.50
                                  FRIEGHT PAYMENT 41,634.20 USD..exeGet hashmaliciousBrowse
                                  • 45.137.22.107
                                  Due Invoices.exeGet hashmaliciousBrowse
                                  • 45.137.22.107
                                  PURCHASE ORDER - #0022223 DATED 29042021.exeGet hashmaliciousBrowse
                                  • 45.137.22.50
                                  PURCHASE ORDER - #0022223, date29042021.exeGet hashmaliciousBrowse
                                  • 45.137.22.50
                                  B_N SAO SWIFT MT103.exeGet hashmaliciousBrowse
                                  • 45.137.22.50
                                  PO0900009.exeGet hashmaliciousBrowse
                                  • 185.222.58.152
                                  PURCHASE ORDER - #0022223 DATED 28042021.exeGet hashmaliciousBrowse
                                  • 45.137.22.50
                                  Order ConfirmationSANQAW12NC9W03.exeGet hashmaliciousBrowse
                                  • 185.222.57.152
                                  PO MT2249C.exeGet hashmaliciousBrowse
                                  • 185.222.57.152
                                  Al kabous LtdPurchase order NO#00421876.exeGet hashmaliciousBrowse
                                  • 185.222.57.152
                                  Al kabous group Ltd - purchase order #04272021.exeGet hashmaliciousBrowse
                                  • 45.137.22.50
                                  0900000000000000000900.exeGet hashmaliciousBrowse
                                  • 185.222.58.152
                                  P08240421_CIF-Pdf.exeGet hashmaliciousBrowse
                                  • 45.137.22.123
                                  ORD-63648.exeGet hashmaliciousBrowse
                                  • 45.137.22.123
                                  FA0900009000.exeGet hashmaliciousBrowse
                                  • 185.222.58.152
                                  Packinglist&certificate of imports.exeGet hashmaliciousBrowse
                                  • 185.222.57.152
                                  TBF-21-52100456221SLIP.exeGet hashmaliciousBrowse
                                  • 185.222.57.152

                                  JA3 Fingerprints

                                  No context

                                  Dropped Files

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  C:\Users\user\AppData\Roaming\fGAhpbrTQZcHeY.exepurchase order acknowledgement.exeGet hashmaliciousBrowse

                                    Created / dropped Files

                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\note-mxm.exe.log
                                    Process:C:\Users\user\Desktop\note-mxm.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:modified
                                    Size (bytes):1314
                                    Entropy (8bit):5.350128552078965
                                    Encrypted:false
                                    SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                    MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                    SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                    SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                    SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                    C:\Users\user\AppData\Local\Temp\tmp943B.tmp
                                    Process:C:\Users\user\Desktop\note-mxm.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1647
                                    Entropy (8bit):5.190755160932022
                                    Encrypted:false
                                    SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGb0tn:cbhK79lNQR/rydbz9I3YODOLNdq3Ky
                                    MD5:9C465D88687A175E59A5172F12074D2C
                                    SHA1:E70078C669274EBEC56EA9BAC13A771C733EA761
                                    SHA-256:7A090FDE949633CC7492697D753BC20A20967C81CC2FAFDAC5407DA6DF50988C
                                    SHA-512:A4C718EAB9DBDD6FF0A3896F8E68C71489D44F94A5FD2C7F7191BAB6FB14C5384B1D80EAB6C77850022981A951124FF14F234309B2B06E3FE8E260CCEF1CB291
                                    Malicious:true
                                    Reputation:low
                                    Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                    Process:C:\Users\user\Desktop\note-mxm.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):1856
                                    Entropy (8bit):7.024371743172393
                                    Encrypted:false
                                    SSDEEP:48:Ik/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrw8:flC0IlC0IlC0IlC0IlC0IlC0IlC0IlCr
                                    MD5:838CD9DBC78EA45A5406EAE23962086D
                                    SHA1:C8273AACDEE03AC0CDCDDBAA83F51D04D6A4203C
                                    SHA-256:6E11A62511C5BBC0413128305069B780C448684B54FAA3E8DD0B4FD3DB8C9867
                                    SHA-512:F7D25EF1FA6F50667DD6785CC774E0AA6BC52A2231FE96E7C59D14EFDFDDA076F6399288CF6EAC8EFA8A75727893432AA155DA0E392F8CD1F26C5C5871EAC6B5
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                    Process:C:\Users\user\Desktop\note-mxm.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):8
                                    Entropy (8bit):3.0
                                    Encrypted:false
                                    SSDEEP:3:liw:liw
                                    MD5:7C5B8D5CE01084BCC3DF9F982DBA59F5
                                    SHA1:E63D0D5F7801A82A6911AA2FF44F4E967A0C7AE6
                                    SHA-256:11401E31B5922DF5D18F3F361853B328BEE3CB50E5DB7E1151A5532B00417939
                                    SHA-512:A88E44890F986794EA56B6E4F5BAE44D0E52D2DF0F650FE42ADF343F2F5262845883D49514AAB1D9790568C6FF594BAFB289AAB1C3B7B720DFFF96125D494264
                                    Malicious:true
                                    Reputation:low
                                    Preview: -.Mw4..H
                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                    Process:C:\Users\user\Desktop\note-mxm.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):40
                                    Entropy (8bit):5.153055907333276
                                    Encrypted:false
                                    SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                    MD5:4E5E92E2369688041CC82EF9650EDED2
                                    SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                    SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                    SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                    Process:C:\Users\user\Desktop\note-mxm.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):327432
                                    Entropy (8bit):7.99938831605763
                                    Encrypted:true
                                    SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                    MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                    SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                    SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                    SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                    Malicious:false
                                    Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                    C:\Users\user\AppData\Roaming\fGAhpbrTQZcHeY.exe
                                    Process:C:\Users\user\Desktop\note-mxm.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):724480
                                    Entropy (8bit):7.664537233778505
                                    Encrypted:false
                                    SSDEEP:12288:KYaTBJ1qtapo1SuoMwcQvFLJlCLL/HDtysCfO263+LS7EytLMsq9Sv:KYaT/1qt8oM9MK9PCYV6OmEcL9v
                                    MD5:116DB2200D9BE33529615FC98907D4D8
                                    SHA1:29CF6588682ACA66C59E41E0517EDE00C75CC76D
                                    SHA-256:43BC7ADA65633263E408152D7B117DE464C9D23B2758D96A6822BDE9AD27B170
                                    SHA-512:B4D80A7769365E0975BF03ADD9F59A618E43FA85F12B1A04C40F428FC32BEE65E14EDB4FD38BEB4DD71C5A588762670C0A2CD18452D790289532BE342C5CBF7E
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: Metadefender, Detection: 30%, Browse
                                    • Antivirus: ReversingLabs, Detection: 57%
                                    Joe Sandbox View:
                                    • Filename: purchase order acknowledgement.exe, Detection: malicious, Browse
                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....`.....................8........... ........@.. .......................`............@.................................\...W.... ..t4........................................................................... ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc...t4... ...6..................@..@........................H........^...............7...&..........................................z.(......}.....(....o....}....*..*...0...........{......E............8...Z...u................*..}..... ].4S}......}.....*..}..... ..Q.}......}.....*..}......{.... Km.a}......}.....*..}..... ,...}......}.....*..}......{.... ..=.a}......}.....*..}..... ....}......}.....*..}..... "G.R}......}.....*..}.....*...{....*.s ...z.2.{.....i...*....0..<........{......3..{....(....o....3...}......+..s.......{....}..
                                    C:\Users\user\AppData\Roaming\fGAhpbrTQZcHeY.exe:Zone.Identifier
                                    Process:C:\Users\user\Desktop\note-mxm.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:true
                                    Preview: [ZoneTransfer]....ZoneId=0

                                    Static File Info

                                    General

                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.664537233778505
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:note-mxm.exe
                                    File size:724480
                                    MD5:116db2200d9be33529615fc98907d4d8
                                    SHA1:29cf6588682aca66c59e41e0517ede00c75cc76d
                                    SHA256:43bc7ada65633263e408152d7b117de464c9d23b2758d96a6822bde9ad27b170
                                    SHA512:b4d80a7769365e0975bf03add9f59a618e43fa85f12b1a04c40f428fc32bee65e14edb4fd38beb4dd71c5a588762670c0a2cd18452d790289532be342c5cbf7e
                                    SSDEEP:12288:KYaTBJ1qtapo1SuoMwcQvFLJlCLL/HDtysCfO263+LS7EytLMsq9Sv:KYaT/1qt8oM9MK9PCYV6OmEcL9v
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`.....................8........... ........@.. .......................`............@................................

                                    File Icon

                                    Icon Hash:00a275154a880000

                                    Static PE Info

                                    General

                                    Entrypoint:0x49f3b6
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                    Time Stamp:0x608C93C7 [Fri Apr 30 23:33:27 2021 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:v4.0.30319
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                    Entrypoint Preview

                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al

                                    Data Directories

                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x9f35c0x57.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xa20000x13474.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xa00000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                    Sections

                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x9d3bc0x9d400False0.882360703994data7.83711506914IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                    .reloc0xa00000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    .rsrc0xa20000x134740x13600False0.20802671371data4.32608110804IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                    Resources

                                    NameRVASizeTypeLanguageCountry
                                    RT_ICON0xa21600x10828data
                                    RT_ICON0xb29880x25b5PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                    RT_GROUP_ICON0xb4f400x22data
                                    RT_VERSION0xb4f640x35cdata
                                    RT_MANIFEST0xb52c00x1b4XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators

                                    Imports

                                    DLLImport
                                    mscoree.dll_CorExeMain

                                    Version Infos

                                    DescriptionData
                                    Translation0x0000 0x04b0
                                    LegalCopyrightCopyright 2017
                                    Assembly Version1.0.0.0
                                    InternalNameSeekOrigin.exe
                                    FileVersion1.0.0.0
                                    CompanyName
                                    LegalTrademarks
                                    Comments
                                    ProductNameTechSupportRegistration
                                    ProductVersion1.0.0.0
                                    FileDescriptionTechSupportRegistration
                                    OriginalFilenameSeekOrigin.exe

                                    Network Behavior

                                    Snort IDS Alerts

                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    05/03/21-15:07:57.124675TCP2025019ET TROJAN Possible NanoCore C2 60B497424557192.168.2.445.137.22.50
                                    05/03/21-15:08:03.659148TCP2025019ET TROJAN Possible NanoCore C2 60B497474557192.168.2.445.137.22.50
                                    05/03/21-15:08:10.757124TCP2025019ET TROJAN Possible NanoCore C2 60B497484557192.168.2.445.137.22.50
                                    05/03/21-15:08:16.850580TCP2025019ET TROJAN Possible NanoCore C2 60B497514557192.168.2.445.137.22.50
                                    05/03/21-15:08:22.830791TCP2025019ET TROJAN Possible NanoCore C2 60B497534557192.168.2.445.137.22.50
                                    05/03/21-15:08:28.864359TCP2025019ET TROJAN Possible NanoCore C2 60B497544557192.168.2.445.137.22.50
                                    05/03/21-15:08:34.846801TCP2025019ET TROJAN Possible NanoCore C2 60B497584557192.168.2.445.137.22.50
                                    05/03/21-15:08:40.971003TCP2025019ET TROJAN Possible NanoCore C2 60B497684557192.168.2.445.137.22.50
                                    05/03/21-15:08:46.397894TCP2025019ET TROJAN Possible NanoCore C2 60B497694557192.168.2.445.137.22.50
                                    05/03/21-15:08:52.510849TCP2025019ET TROJAN Possible NanoCore C2 60B497754557192.168.2.445.137.22.50
                                    05/03/21-15:08:58.520473TCP2025019ET TROJAN Possible NanoCore C2 60B497764557192.168.2.445.137.22.50
                                    05/03/21-15:09:04.550871TCP2025019ET TROJAN Possible NanoCore C2 60B497774557192.168.2.445.137.22.50
                                    05/03/21-15:09:10.601121TCP2025019ET TROJAN Possible NanoCore C2 60B497784557192.168.2.445.137.22.50
                                    05/03/21-15:09:16.600739TCP2025019ET TROJAN Possible NanoCore C2 60B497794557192.168.2.445.137.22.50
                                    05/03/21-15:09:22.600482TCP2025019ET TROJAN Possible NanoCore C2 60B497814557192.168.2.445.137.22.50
                                    05/03/21-15:09:28.606933TCP2025019ET TROJAN Possible NanoCore C2 60B497834557192.168.2.445.137.22.50
                                    05/03/21-15:09:34.634981TCP2025019ET TROJAN Possible NanoCore C2 60B497844557192.168.2.445.137.22.50
                                    05/03/21-15:09:40.616698TCP2025019ET TROJAN Possible NanoCore C2 60B497854557192.168.2.445.137.22.50
                                    05/03/21-15:09:47.945632TCP2025019ET TROJAN Possible NanoCore C2 60B497864557192.168.2.445.137.22.50
                                    05/03/21-15:09:53.914914TCP2025019ET TROJAN Possible NanoCore C2 60B497874557192.168.2.445.137.22.50

                                    Network Port Distribution

                                    TCP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    May 3, 2021 15:07:57.037607908 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.084256887 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.084394932 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.124675035 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.196150064 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.221226931 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.270549059 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.285933971 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.362386942 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.392587900 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.392664909 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.392700911 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.392734051 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.392741919 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.392771959 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.392793894 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.435008049 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.439896107 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.439963102 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.439986944 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.440010071 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.440032959 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.440056086 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.440057039 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.440102100 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.440150023 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.440196991 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.440226078 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.440244913 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.440256119 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.440273046 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.440347910 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.486797094 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.486866951 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.486907005 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.486928940 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.487159014 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.487211943 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.487261057 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.487309933 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.487324953 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.487360954 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.487363100 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.487411976 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.487463951 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.487513065 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.487565994 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.487570047 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.487653017 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.487680912 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.487714052 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.487751007 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.487776041 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.487835884 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.487873077 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.487898111 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.487946987 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.487951040 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.534754038 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.534823895 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.534883022 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.534931898 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.534956932 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.534981966 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.534998894 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.535032988 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535075903 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.535084963 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535135031 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535182953 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535234928 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535247087 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.535284996 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535295010 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.535336018 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535387039 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535393953 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.535432100 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535485029 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.535486937 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535537004 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535587072 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535605907 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.535635948 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535687923 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535712957 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.535737991 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535787106 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535808086 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.535837889 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535887957 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.535897017 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.535938978 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.536005020 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.536066055 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.536089897 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.536144972 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.536176920 CEST497424557192.168.2.445.137.22.50
                                    May 3, 2021 15:07:57.536201954 CEST45574974245.137.22.50192.168.2.4
                                    May 3, 2021 15:07:57.536257029 CEST45574974245.137.22.50192.168.2.4

                                    Code Manipulations

                                    Statistics

                                    Behavior

                                    Click to jump to process

                                    System Behavior

                                    General

                                    Start time:15:07:47
                                    Start date:03/05/2021
                                    Path:C:\Users\user\Desktop\note-mxm.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Users\user\Desktop\note-mxm.exe'
                                    Imagebase:0xbd0000
                                    File size:724480 bytes
                                    MD5 hash:116DB2200D9BE33529615FC98907D4D8
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp, Author: Joe Security
                                    Reputation:low

                                    General

                                    Start time:15:07:51
                                    Start date:03/05/2021
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\fGAhpbrTQZcHeY' /XML 'C:\Users\user\AppData\Local\Temp\tmp943B.tmp'
                                    Imagebase:0x980000
                                    File size:185856 bytes
                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:15:07:51
                                    Start date:03/05/2021
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff724c50000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:15:07:52
                                    Start date:03/05/2021
                                    Path:C:\Users\user\Desktop\note-mxm.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\note-mxm.exe
                                    Imagebase:0xe50000
                                    File size:724480 bytes
                                    MD5 hash:116DB2200D9BE33529615FC98907D4D8
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    Disassembly

                                    Code Analysis

                                    Reset < >