Loading ...

Play interactive tourEdit tour

Analysis Report PO #KV18RE001-A5491.exe

Overview

General Information

Sample Name:PO #KV18RE001-A5491.exe
Analysis ID:411850
MD5:9d9cb0f32a77d7d81296095768d3583e
SHA1:8386cdbc85faede7527aa83b4646dff3f9edc910
SHA256:0cbbdd2c9615f4d2de4e0232ace6b69889a54538444838ac6616a5aa39109c98
Tags:exeNanoCore
Infos:

Most interesting Screenshot:

Detection

Nanocore AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected Nanocore RAT
.NET source code contains very large array initializations
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Direct Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara detected Credential Stealer
Yara signature match

Classification

Startup

  • System is w10x64
  • PO #KV18RE001-A5491.exe (PID: 5580 cmdline: 'C:\Users\user\Desktop\PO #KV18RE001-A5491.exe' MD5: 9D9CB0F32A77D7D81296095768D3583E)
    • cmd.exe (PID: 4064 cmdline: 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'googles' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\googles.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 3864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • reg.exe (PID: 2416 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'googles' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\googles.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
    • googles.exe (PID: 1196 cmdline: 'C:\Users\user\AppData\Roaming\googles.exe' MD5: 9D9CB0F32A77D7D81296095768D3583E)
  • googles.exe (PID: 6120 cmdline: 'C:\Users\user\AppData\Roaming\googles.exe' MD5: 9D9CB0F32A77D7D81296095768D3583E)
    • ammero.exe (PID: 1784 cmdline: 'C:\Users\user\AppData\Roaming\ammero.exe' MD5: 605E939E44CD9B02C55CE0A09019AD47)
    • InstallUtil.exe (PID: 5476 cmdline: C:\Users\user\AppData\Local\Temp\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
      • schtasks.exe (PID: 3596 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp460B.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 1048 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5544 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp48BB.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 2428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • InstallUtil.exe (PID: 632 cmdline: C:\Users\user\AppData\Local\Temp\InstallUtil.exe 0 MD5: EFEC8C379D165E3F33B536739AEE26A3)
    • conhost.exe (PID: 492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 5268 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: EFEC8C379D165E3F33B536739AEE26A3)
    • conhost.exe (PID: 5284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 5596 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: EFEC8C379D165E3F33B536739AEE26A3)
    • conhost.exe (PID: 5656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "ed3103ae-73a9-4ea2-b0ca-9ce4d3e3", "Group": "POOKIE", "Domain1": "79.134.225.91", "Domain2": "", "Port": 4488, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "aammorris@askoblue.comoffice12#smtp.privateemail.com"}

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\ammero.exeJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    C:\Users\user\AppData\Roaming\ammero.exeJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security

      Memory Dumps

      SourceRuleDescriptionAuthorStrings
      00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1035f:$x1: NanoCore.ClientPluginHost
      • 0x793ed:$x1: NanoCore.ClientPluginHost
      • 0x1039c:$x2: IClientNetworkHost
      • 0x7942a:$x2: IClientNetworkHost
      • 0x13ecf:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      • 0x7cf5d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
            00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
            • 0x100c7:$a: NanoCore
            • 0x100d7:$a: NanoCore
            • 0x1030b:$a: NanoCore
            • 0x1031f:$a: NanoCore
            • 0x1035f:$a: NanoCore
            • 0x79155:$a: NanoCore
            • 0x79165:$a: NanoCore
            • 0x79399:$a: NanoCore
            • 0x793ad:$a: NanoCore
            • 0x793ed:$a: NanoCore
            • 0x10126:$b: ClientPlugin
            • 0x10328:$b: ClientPlugin
            • 0x10368:$b: ClientPlugin
            • 0x791b4:$b: ClientPlugin
            • 0x793b6:$b: ClientPlugin
            • 0x793f6:$b: ClientPlugin
            • 0x1024d:$c: ProjectData
            • 0x62a87:$c: ProjectData
            • 0x792db:$c: ProjectData
            • 0xcbb06:$c: ProjectData
            • 0x10c54:$d: DESCrypto
            Click to see the 44 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            17.2.InstallUtil.exe.371b78e.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
            • 0xe75:$x1: NanoCore.ClientPluginHost
            • 0x145e3:$x1: NanoCore.ClientPluginHost
            • 0x2d5a7:$x1: NanoCore.ClientPluginHost
            • 0xe8f:$x2: IClientNetworkHost
            • 0x14610:$x2: IClientNetworkHost
            • 0x2d5d4:$x2: IClientNetworkHost
            17.2.InstallUtil.exe.371b78e.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
            • 0xe75:$x2: NanoCore.ClientPluginHost
            • 0x145e3:$x2: NanoCore.ClientPluginHost
            • 0x2d5a7:$x2: NanoCore.ClientPluginHost
            • 0x1261:$s3: PipeExists
            • 0x1136:$s4: PipeCreated
            • 0x156be:$s4: PipeCreated
            • 0x2e682:$s4: PipeCreated
            • 0xeb0:$s5: IClientLoggingHost
            • 0x145fd:$s5: IClientLoggingHost
            • 0x2d5c1:$s5: IClientLoggingHost
            17.2.InstallUtil.exe.371b78e.5.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
              17.2.InstallUtil.exe.371b78e.5.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
              • 0xddf:$a: NanoCore
              • 0xe38:$a: NanoCore
              • 0xe75:$a: NanoCore
              • 0xeee:$a: NanoCore
              • 0x14599:$a: NanoCore
              • 0x145ae:$a: NanoCore
              • 0x145e3:$a: NanoCore
              • 0x2d55d:$a: NanoCore
              • 0x2d572:$a: NanoCore
              • 0x2d5a7:$a: NanoCore
              • 0xe41:$b: ClientPlugin
              • 0xe7e:$b: ClientPlugin
              • 0x177c:$b: ClientPlugin
              • 0x1789:$b: ClientPlugin
              • 0x14355:$b: ClientPlugin
              • 0x14370:$b: ClientPlugin
              • 0x143a0:$b: ClientPlugin
              • 0x145b7:$b: ClientPlugin
              • 0x145ec:$b: ClientPlugin
              • 0x2d319:$b: ClientPlugin
              • 0x2d334:$b: ClientPlugin
              7.2.googles.exe.447a1d2.4.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
              • 0xe38d:$x1: NanoCore.ClientPluginHost
              • 0xe3ca:$x2: IClientNetworkHost
              • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
              Click to see the 137 entries

              Sigma Overview

              AV Detection:

              barindex
              Sigma detected: NanoCoreShow sources
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ProcessId: 5476, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

              E-Banking Fraud:

              barindex
              Sigma detected: NanoCoreShow sources
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ProcessId: 5476, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

              System Summary:

              barindex
              Sigma detected: Direct Autorun Keys ModificationShow sources
              Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'googles' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\googles.exe', CommandLine: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'googles' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\googles.exe', CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'googles' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\googles.exe', ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4064, ProcessCommandLine: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'googles' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\googles.exe', ProcessId: 2416
              Sigma detected: Possible Applocker BypassShow sources
              Source: Process startedAuthor: juju4: Data: Command: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, CommandLine: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ParentCommandLine: 'C:\Users\user\AppData\Roaming\googles.exe' , ParentImage: C:\Users\user\AppData\Roaming\googles.exe, ParentProcessId: 6120, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ProcessId: 5476

              Stealing of Sensitive Information:

              barindex
              Sigma detected: NanoCoreShow sources
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ProcessId: 5476, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

              Remote Access Functionality:

              barindex
              Sigma detected: NanoCoreShow sources
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ProcessId: 5476, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Antivirus detection for dropped fileShow sources
              Source: C:\Users\user\AppData\Roaming\ammero.exeAvira: detection malicious, Label: TR/Spy.Gen8
              Found malware configurationShow sources
              Source: 00000011.00000002.495140225.0000000003719000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "ed3103ae-73a9-4ea2-b0ca-9ce4d3e3", "Group": "POOKIE", "Domain1": "79.134.225.91", "Domain2": "", "Port": 4488, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
              Source: 16.2.ammero.exe.9e0000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "aammorris@askoblue.comoffice12#smtp.privateemail.com"}
              Multi AV Scanner detection for dropped fileShow sources
              Source: C:\Users\user\AppData\Roaming\ammero.exeReversingLabs: Detection: 75%
              Source: C:\Users\user\AppData\Roaming\googles.exeMetadefender: Detection: 20%Perma Link
              Source: C:\Users\user\AppData\Roaming\googles.exeReversingLabs: Detection: 38%
              Multi AV Scanner detection for submitted fileShow sources
              Source: PO #KV18RE001-A5491.exeVirustotal: Detection: 33%Perma Link
              Source: PO #KV18RE001-A5491.exeMetadefender: Detection: 20%Perma Link
              Source: PO #KV18RE001-A5491.exeReversingLabs: Detection: 38%
              Yara detected Nanocore RATShow sources
              Source: Yara matchFile source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.306129386.000000000454E000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.477862066.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.495140225.0000000003719000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.502813497.0000000004407000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.501438329.0000000005DC0000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PO #KV18RE001-A5491.exe PID: 5580, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5476, type: MEMORY
              Source: Yara matchFile source: 17.2.InstallUtil.exe.371b78e.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.447a1d2.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44e3260.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46339b2.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.447a1d2.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44ace01.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46665e1.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46339b2.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.45fd531.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.45eab19.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.5dc0000.11.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.37205c4.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.449a3e9.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.3724bed.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.5dc0000.11.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44e3260.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.37205c4.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.5dc4629.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.4409510.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4653bc9.2.raw.unpack, type: UNPACKEDPE
              Machine Learning detection for dropped fileShow sources
              Source: C:\Users\user\AppData\Roaming\googles.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Roaming\ammero.exeJoe Sandbox ML: detected
              Machine Learning detection for sampleShow sources
              Source: PO #KV18RE001-A5491.exeJoe Sandbox ML: detected
              Source: 17.2.InstallUtil.exe.5dc0000.11.unpackAvira: Label: TR/NanoCore.fadte
              Source: 17.2.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
              Source: PO #KV18RE001-A5491.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log
              Source: PO #KV18RE001-A5491.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
              Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: PO #KV18RE001-A5491.exe, 00000000.00000003.268720921.00000000016DB000.00000004.00000001.sdmp, InstallUtil.exe, 00000011.00000002.478744481.0000000000482000.00000002.00020000.sdmp, InstallUtil.exe, 00000016.00000002.358869888.00000000005F2000.00000002.00020000.sdmp, dhcpmon.exe, 00000018.00000000.361931219.00000000007A2000.00000002.00020000.sdmp, dhcpmon.exe, 0000001A.00000000.378776291.00000000009D2000.00000002.00020000.sdmp, dhcpmon.exe.17.dr
              Source: Binary string: InstallUtil.pdb source: PO #KV18RE001-A5491.exe, 00000000.00000003.268720921.00000000016DB000.00000004.00000001.sdmp, InstallUtil.exe, InstallUtil.exe, 00000016.00000002.358869888.00000000005F2000.00000002.00020000.sdmp, dhcpmon.exe, 00000018.00000000.361931219.00000000007A2000.00000002.00020000.sdmp, dhcpmon.exe, 0000001A.00000000.378776291.00000000009D2000.00000002.00020000.sdmp, dhcpmon.exe.17.dr
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 4x nop then jmp 065064F9h
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 4x nop then jmp 05D36629h
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 4x nop then jmp 05D36629h
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h

              Networking:

              barindex
              C2 URLs / IPs found in malware configurationShow sources
              Source: Malware configuration extractorURLs:
              Source: Malware configuration extractorURLs: 79.134.225.91
              Source: global trafficTCP traffic: 192.168.2.3:49691 -> 79.134.225.91:4488
              Source: Joe Sandbox ViewIP Address: 79.134.225.91 79.134.225.91
              Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.91
              Source: ammero.exe, 00000010.00000002.489309809.0000000003011000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
              Source: ammero.exe, 00000010.00000002.489309809.0000000003011000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
              Source: ammero.exe, 00000010.00000002.489309809.0000000003011000.00000004.00000001.sdmpString found in binary or memory: http://MFWCde.com
              Source: googles.exe, 00000007.00000002.488779548.00000000015C6000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: googles.exe, 00000007.00000002.488779548.00000000015C6000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/GTS1O1core.crl0
              Source: googles.exe, 00000007.00000002.489117933.0000000001603000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/gsr2/gsr2.crl0?
              Source: PO #KV18RE001-A5491.exe, 00000000.00000003.235475401.00000000016BA000.00000004.00000001.sdmp, googles.exe, 00000007.00000002.489117933.0000000001603000.00000004.00000020.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
              Source: PO #KV18RE001-A5491.exe, 00000000.00000003.232494092.00000000076DA000.00000004.00000001.sdmp, PO #KV18RE001-A5491.exe, 00000000.00000003.297857855.00000000076E1000.00000004.00000001.sdmpString found in binary or memory: http://ns.ado/1
              Source: googles.exe, 00000007.00000003.296832321.00000000075FA000.00000004.00000001.sdmpString found in binary or memory: http://ns.ado/1j
              Source: PO #KV18RE001-A5491.exe, 00000000.00000003.232494092.00000000076DA000.00000004.00000001.sdmp, PO #KV18RE001-A5491.exe, 00000000.00000003.297857855.00000000076E1000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c/g
              Source: googles.exe, 00000007.00000003.296832321.00000000075FA000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c/gj
              Source: PO #KV18RE001-A5491.exe, 00000000.00000003.232494092.00000000076DA000.00000004.00000001.sdmp, PO #KV18RE001-A5491.exe, 00000000.00000003.297857855.00000000076E1000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.cobj
              Source: googles.exe, 00000007.00000003.296832321.00000000075FA000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.cobjj
              Source: PO #KV18RE001-A5491.exe, 00000000.00000003.235475401.00000000016BA000.00000004.00000001.sdmp, googles.exe, 00000007.00000002.489117933.0000000001603000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.digicert.com0:
              Source: googles.exe, 00000007.00000002.489117933.0000000001603000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.msocsp.com0
              Source: googles.exe, 00000007.00000002.489117933.0000000001603000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr202
              Source: googles.exe, 00000007.00000002.488779548.00000000015C6000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gts1o1core0
              Source: googles.exe, 00000007.00000002.488779548.00000000015C6000.00000004.00000020.sdmpString found in binary or memory: http://pki.goog/gsr2/GTS1O1.crt0
              Source: googles.exe, 0000000F.00000002.328049985.0000000003362000.00000004.00000001.sdmp, googles.exe, 0000000F.00000002.328086949.0000000003378000.00000004.00000001.sdmpString found in binary or memory: http://schema.org/WebPage
              Source: PO #KV18RE001-A5491.exe, 00000000.00000002.300286762.00000000033F1000.00000004.00000001.sdmp, googles.exe, 00000007.00000002.491630441.0000000003401000.00000004.00000001.sdmp, googles.exe, 0000000F.00000002.328020119.0000000003331000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: ammero.exe, 00000010.00000002.489309809.0000000003011000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
              Source: googles.exe, 00000007.00000002.489117933.0000000001603000.00000004.00000020.sdmpString found in binary or memory: https://pki.goog/repository/0
              Source: PO #KV18RE001-A5491.exe, 00000000.00000002.300286762.00000000033F1000.00000004.00000001.sdmp, googles.exe, 00000007.00000002.491630441.0000000003401000.00000004.00000001.sdmp, googles.exe, 0000000F.00000002.328020119.0000000003331000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com
              Source: PO #KV18RE001-A5491.exe, 00000000.00000002.300286762.00000000033F1000.00000004.00000001.sdmp, googles.exe, 00000007.00000002.491630441.0000000003401000.00000004.00000001.sdmp, googles.exe, 0000000F.00000002.328020119.0000000003331000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/
              Source: PO #KV18RE001-A5491.exe, 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, googles.exe, 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, ammero.exe, ammero.exe.7.drString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
              Source: ammero.exe, 00000010.00000002.489309809.0000000003011000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
              Source: googles.exe, 00000007.00000002.488161652.0000000001559000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
              Source: C:\Users\user\AppData\Roaming\ammero.exeWindow created: window name: CLIPBRDWNDCLASS
              Source: InstallUtil.exe, 00000011.00000002.495140225.0000000003719000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

              E-Banking Fraud:

              barindex
              Yara detected Nanocore RATShow sources
              Source: Yara matchFile source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.306129386.000000000454E000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.477862066.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.495140225.0000000003719000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.502813497.0000000004407000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.501438329.0000000005DC0000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PO #KV18RE001-A5491.exe PID: 5580, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5476, type: MEMORY
              Source: Yara matchFile source: 17.2.InstallUtil.exe.371b78e.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.447a1d2.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44e3260.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46339b2.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.447a1d2.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44ace01.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46665e1.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46339b2.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.45fd531.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.45eab19.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.5dc0000.11.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.37205c4.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.449a3e9.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.3724bed.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.5dc0000.11.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44e3260.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.37205c4.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.5dc4629.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.4409510.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4653bc9.2.raw.unpack, type: UNPACKEDPE

              System Summary:

              barindex
              Malicious sample detected (through community Yara rule)Show sources
              Source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 00000000.00000002.306129386.000000000454E000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 00000000.00000002.306129386.000000000454E000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 00000011.00000002.477862066.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 00000011.00000002.477862066.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 00000011.00000002.495140225.0000000003719000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 00000007.00000002.502813497.0000000004407000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 00000007.00000002.502813497.0000000004407000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 00000011.00000002.500714113.0000000005020000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 00000011.00000002.501438329.0000000005DC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: Process Memory Space: PO #KV18RE001-A5491.exe PID: 5580, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: Process Memory Space: PO #KV18RE001-A5491.exe PID: 5580, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: Process Memory Space: InstallUtil.exe PID: 5476, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: Process Memory Space: InstallUtil.exe PID: 5476, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 17.2.InstallUtil.exe.371b78e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 17.2.InstallUtil.exe.371b78e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 7.2.googles.exe.447a1d2.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 7.2.googles.exe.447a1d2.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 7.2.googles.exe.44e3260.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 7.2.googles.exe.44e3260.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 7.2.googles.exe.46339b2.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 7.2.googles.exe.46339b2.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 7.2.googles.exe.447a1d2.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 7.2.googles.exe.447a1d2.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 7.2.googles.exe.44ace01.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 7.2.googles.exe.44ace01.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 7.2.googles.exe.46665e1.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 7.2.googles.exe.46665e1.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 7.2.googles.exe.46339b2.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 7.2.googles.exe.46339b2.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 7.2.googles.exe.45fd531.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 7.2.googles.exe.45fd531.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.3.PO #KV18RE001-A5491.exe.45eab19.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 0.3.PO #KV18RE001-A5491.exe.45eab19.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 17.2.InstallUtil.exe.5dc0000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 17.2.InstallUtil.exe.37205c4.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 0.2.PO #KV18RE001-A5491.exe.449a3e9.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 0.2.PO #KV18RE001-A5491.exe.449a3e9.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 17.2.InstallUtil.exe.5020000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 17.2.InstallUtil.exe.3724bed.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 17.2.InstallUtil.exe.5dc0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 7.2.googles.exe.44e3260.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 7.2.googles.exe.44e3260.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 17.2.InstallUtil.exe.37205c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 17.2.InstallUtil.exe.5dc4629.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 7.2.googles.exe.4409510.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 7.2.googles.exe.4409510.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.3.PO #KV18RE001-A5491.exe.4653bc9.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
              Source: 0.3.PO #KV18RE001-A5491.exe.4653bc9.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
              .NET source code contains very large array initializationsShow sources
              Source: PO #KV18RE001-A5491.exe, b6YF/e9R5.csLarge array initialization: .cctor: array initializer size 9606
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F91DC CreateProcessAsUserW,
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 0_2_0337D378
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 0_2_06507758
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 0_2_06504148
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 0_2_06505C69
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 0_2_06506511
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 0_2_06506520
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 0_2_06507C60
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 0_2_06501B58
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 0_2_06501B4A
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 0_2_06F55EB0
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 0_2_06F55EAB
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 0_2_06F54CD0
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 0_2_06F54CC0
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 0_2_06F54C78
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_0183C758
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_0183D378
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_05D36650
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_05D36641
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_05D34278
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_05D34269
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_05D37D9D
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_05D35DB0
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_05D37DA0
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_05D3BF58
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_05D31B58
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_05D31B4B
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F9700
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072FBF00
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F3F10
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F2798
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F5238
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F7428
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F3468
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F6CF8
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F3F01
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F2788
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F522A
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072FA218
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F8640
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F8650
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F8AB7
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F96F0
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072FBEF0
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F8AC8
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072FCAD0
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072FADA8
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F0006
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F7418
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F0040
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F3458
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_072F6CE8
              Source: C:\Users\user\AppData\Roaming\ammero.exeCode function: 16_2_02E446A0
              Source: C:\Users\user\AppData\Roaming\ammero.exeCode function: 16_2_02E44630
              Source: C:\Users\user\AppData\Roaming\ammero.exeCode function: 16_2_02E445B0
              Source: C:\Users\user\AppData\Roaming\ammero.exeCode function: 16_2_02E4D301
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 17_2_004820B0
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 17_2_04C3E480
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 17_2_04C3E471
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 17_2_04C3BBD4
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 17_2_06180040
              Source: PO #KV18RE001-A5491.exeBinary or memory string: OriginalFilename vs PO #KV18RE001-A5491.exe
              Source: PO #KV18RE001-A5491.exe, 00000000.00000000.209068942.00000000010F3000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameAABBA.exe@ vs PO #KV18RE001-A5491.exe
              Source: PO #KV18RE001-A5491.exe, 00000000.00000002.308551963.0000000007B20000.00000002.00000001.sdmpBinary or memory string: originalfilename vs PO #KV18RE001-A5491.exe
              Source: PO #KV18RE001-A5491.exe, 00000000.00000002.308551963.0000000007B20000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs PO #KV18RE001-A5491.exe
              Source: PO #KV18RE001-A5491.exe, 00000000.00000002.305645909.00000000043F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSHCore1.dll0 vs PO #KV18RE001-A5491.exe
              Source: PO #KV18RE001-A5491.exe, 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamekTxZZsFogLqcfVfqFGabTdrZoQRJoQwA.exe4 vs PO #KV18RE001-A5491.exe
              Source: PO #KV18RE001-A5491.exe, 00000000.00000003.268720921.00000000016DB000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameInstallUtil.exeT vs PO #KV18RE001-A5491.exe
              Source: PO #KV18RE001-A5491.exe, 00000000.00000002.308294344.0000000007AC0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs PO #KV18RE001-A5491.exe
              Source: PO #KV18RE001-A5491.exe, 00000000.00000002.307227260.0000000006E70000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs PO #KV18RE001-A5491.exe
              Source: PO #KV18RE001-A5491.exeBinary or memory string: OriginalFilenameAABBA.exe@ vs PO #KV18RE001-A5491.exe
              Source: PO #KV18RE001-A5491.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'googles' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\googles.exe'
              Source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 00000000.00000002.306129386.000000000454E000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 00000000.00000002.306129386.000000000454E000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 00000011.00000002.477862066.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 00000011.00000002.477862066.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 00000011.00000002.495140225.0000000003719000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 00000007.00000002.502813497.0000000004407000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 00000007.00000002.502813497.0000000004407000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 00000011.00000002.500714113.0000000005020000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 00000011.00000002.500714113.0000000005020000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000011.00000002.501438329.0000000005DC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 00000011.00000002.501438329.0000000005DC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: Process Memory Space: PO #KV18RE001-A5491.exe PID: 5580, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: Process Memory Space: PO #KV18RE001-A5491.exe PID: 5580, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: Process Memory Space: InstallUtil.exe PID: 5476, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: Process Memory Space: InstallUtil.exe PID: 5476, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 17.2.InstallUtil.exe.371b78e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 17.2.InstallUtil.exe.371b78e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 17.2.InstallUtil.exe.371b78e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 7.2.googles.exe.447a1d2.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 7.2.googles.exe.447a1d2.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.2.googles.exe.447a1d2.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 7.2.googles.exe.44e3260.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 7.2.googles.exe.44e3260.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.2.googles.exe.44e3260.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 7.2.googles.exe.46339b2.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 7.2.googles.exe.46339b2.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.2.googles.exe.46339b2.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 7.2.googles.exe.447a1d2.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 7.2.googles.exe.447a1d2.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 7.2.googles.exe.44ace01.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 7.2.googles.exe.44ace01.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 7.2.googles.exe.46665e1.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 7.2.googles.exe.46665e1.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 7.2.googles.exe.46339b2.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 7.2.googles.exe.46339b2.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 7.2.googles.exe.45fd531.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 7.2.googles.exe.45fd531.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 0.3.PO #KV18RE001-A5491.exe.45eab19.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 0.3.PO #KV18RE001-A5491.exe.45eab19.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 17.2.InstallUtil.exe.5dc0000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 17.2.InstallUtil.exe.5dc0000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 17.2.InstallUtil.exe.37205c4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 17.2.InstallUtil.exe.37205c4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.PO #KV18RE001-A5491.exe.449a3e9.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 0.2.PO #KV18RE001-A5491.exe.449a3e9.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 17.2.InstallUtil.exe.5020000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 17.2.InstallUtil.exe.5020000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 17.2.InstallUtil.exe.3724bed.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 17.2.InstallUtil.exe.3724bed.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 17.2.InstallUtil.exe.5dc0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 17.2.InstallUtil.exe.5dc0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 7.2.googles.exe.44e3260.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 7.2.googles.exe.44e3260.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.2.googles.exe.44e3260.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 17.2.InstallUtil.exe.37205c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 17.2.InstallUtil.exe.37205c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 17.2.InstallUtil.exe.5dc4629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 17.2.InstallUtil.exe.5dc4629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.2.googles.exe.4409510.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 7.2.googles.exe.4409510.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.2.googles.exe.4409510.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: 0.3.PO #KV18RE001-A5491.exe.4653bc9.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
              Source: 0.3.PO #KV18RE001-A5491.exe.4653bc9.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
              Source: classification engineClassification label: mal100.troj.evad.winEXE@25/16@0/2
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeFile created: C:\Program Files (x86)\DHCP Monitor
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeFile created: C:\Users\user\AppData\Roaming\googles.exeJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5656:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5284:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1048:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2428:120:WilError_01
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{ed3103ae-73a9-4ea2-b0ca-9ce4d3e33b39}
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3864:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:492:120:WilError_01
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to behavior
              Source: PO #KV18RE001-A5491.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Roaming\googles.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Roaming\googles.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Roaming\ammero.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Roaming\ammero.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\googles.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\googles.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\googles.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\googles.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\googles.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\googles.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: PO #KV18RE001-A5491.exeVirustotal: Detection: 33%
              Source: PO #KV18RE001-A5491.exeMetadefender: Detection: 20%
              Source: PO #KV18RE001-A5491.exeReversingLabs: Detection: 38%
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeFile read: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\PO #KV18RE001-A5491.exe 'C:\Users\user\Desktop\PO #KV18RE001-A5491.exe'
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'googles' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\googles.exe'
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'googles' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\googles.exe'
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\googles.exe 'C:\Users\user\AppData\Roaming\googles.exe'
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess created: C:\Users\user\AppData\Roaming\googles.exe 'C:\Users\user\AppData\Roaming\googles.exe'
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess created: C:\Users\user\AppData\Roaming\ammero.exe 'C:\Users\user\AppData\Roaming\ammero.exe'
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp460B.tmp'
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp48BB.tmp'
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe 0
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'googles' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\googles.exe'
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess created: C:\Users\user\AppData\Roaming\googles.exe 'C:\Users\user\AppData\Roaming\googles.exe'
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'googles' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\googles.exe'
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess created: C:\Users\user\AppData\Roaming\ammero.exe 'C:\Users\user\AppData\Roaming\ammero.exe'
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp460B.tmp'
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp48BB.tmp'
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F324E4F9-8496-40b2-A1FF-9617C1C9AFFE}\InProcServer32
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
              Source: PO #KV18RE001-A5491.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: PO #KV18RE001-A5491.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: PO #KV18RE001-A5491.exeStatic file information: File size 1270784 > 1048576
              Source: PO #KV18RE001-A5491.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x125200
              Source: PO #KV18RE001-A5491.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
              Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: PO #KV18RE001-A5491.exe, 00000000.00000003.268720921.00000000016DB000.00000004.00000001.sdmp, InstallUtil.exe, 00000011.00000002.478744481.0000000000482000.00000002.00020000.sdmp, InstallUtil.exe, 00000016.00000002.358869888.00000000005F2000.00000002.00020000.sdmp, dhcpmon.exe, 00000018.00000000.361931219.00000000007A2000.00000002.00020000.sdmp, dhcpmon.exe, 0000001A.00000000.378776291.00000000009D2000.00000002.00020000.sdmp, dhcpmon.exe.17.dr
              Source: Binary string: InstallUtil.pdb source: PO #KV18RE001-A5491.exe, 00000000.00000003.268720921.00000000016DB000.00000004.00000001.sdmp, InstallUtil.exe, InstallUtil.exe, 00000016.00000002.358869888.00000000005F2000.00000002.00020000.sdmp, dhcpmon.exe, 00000018.00000000.361931219.00000000007A2000.00000002.00020000.sdmp, dhcpmon.exe, 0000001A.00000000.378776291.00000000009D2000.00000002.00020000.sdmp, dhcpmon.exe.17.dr
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeCode function: 0_2_00FE6CC5 push cs; ret
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_00E06CC5 push cs; ret
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_05D38602 push E912515Eh; ret
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_05D39DE3 push E804CF5Eh; retf
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 7_2_05D39E02 push E803D85Eh; ret
              Source: C:\Users\user\AppData\Roaming\googles.exeCode function: 15_2_00D66CC5 push cs; ret
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 17_2_04C3E471 push ebx; mov dword ptr [esp], 5504C5D5h
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 17_2_04C3E0D8 push ecx; mov dword ptr [esp], 55025597h
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 17_2_04C3C078 push ds; retf
              Source: PO #KV18RE001-A5491.exe, Gd7/Wt2.csHigh entropy of concatenated method names: '.ctor', 'So1', 'g7H', 'q7B', 'j5G', 'n1L', 'a4G', 'Gn3', 'Ap4', 'Cb0'
              Source: PO #KV18RE001-A5491.exe, Qd7c/e5TX.csHigh entropy of concatenated method names: '.ctor', 'g9PJ', 'g4QG', 'n7B2', 'He2c', 'Hq98', 'p8YG', 'Dz75', 't9JF', 'Hs1m'
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeFile created: C:\Users\user\AppData\Roaming\googles.exeJump to dropped file
              Source: C:\Users\user\AppData\Roaming\googles.exeFile created: C:\Users\user\AppData\Roaming\ammero.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log

              Boot Survival:

              barindex
              Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp460B.tmp'
              Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run googlesJump to behavior
              Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run googlesJump to behavior

              Hooking and other Techniques for Hiding and Protection:

              barindex
              Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeFile opened: C:\Users\user\Desktop\PO #KV18RE001-A5491.exe\:Zone.Identifier read attributes | delete
              Source: C:\Users\user\AppData\Roaming\googles.exeFile opened: C:\Users\user\AppData\Roaming\googles.exe\:Zone.Identifier read attributes | delete
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Temp\InstallUtil.exe:Zone.Identifier read attributes | delete
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion:

              barindex
              Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
              Source: C:\Users\user\AppData\Roaming\ammero.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
              Source: C:\Users\user\AppData\Roaming\ammero.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: C:\Users\user\AppData\Roaming\googles.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\googles.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\googles.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\googles.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\ammero.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeThread delayed: delay time: 922337203685477
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeWindow / User API: threadDelayed 7252
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeWindow / User API: threadDelayed 2283
              Source: C:\Users\user\AppData\Roaming\googles.exeWindow / User API: threadDelayed 3306
              Source: C:\Users\user\AppData\Roaming\googles.exeWindow / User API: threadDelayed 6387
              Source: C:\Users\user\AppData\Roaming\ammero.exeWindow / User API: threadDelayed 1867
              Source: C:\Users\user\AppData\Roaming\ammero.exeWindow / User API: threadDelayed 7923
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: threadDelayed 6702
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: threadDelayed 2854
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exe TID: 5656Thread sleep time: -17524406870024063s >= -30000s
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exe TID: 5564Thread sleep time: -30000s >= -30000s
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exe TID: 5572Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\googles.exe TID: 6084Thread sleep time: -17524406870024063s >= -30000s
              Source: C:\Users\user\AppData\Roaming\googles.exe TID: 204Thread sleep count: 3306 > 30
              Source: C:\Users\user\AppData\Roaming\googles.exe TID: 204Thread sleep count: 6387 > 30
              Source: C:\Users\user\AppData\Roaming\googles.exe TID: 2168Thread sleep time: -2767011611056431s >= -30000s
              Source: C:\Users\user\AppData\Roaming\googles.exe TID: 1256Thread sleep count: 84 > 30
              Source: C:\Users\user\AppData\Roaming\googles.exe TID: 1256Thread sleep count: 140 > 30
              Source: C:\Users\user\AppData\Roaming\googles.exe TID: 1180Thread sleep time: -30000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\googles.exe TID: 5860Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\ammero.exe TID: 2288Thread sleep time: -21213755684765971s >= -30000s
              Source: C:\Users\user\AppData\Roaming\ammero.exe TID: 64Thread sleep count: 1867 > 30
              Source: C:\Users\user\AppData\Roaming\ammero.exe TID: 64Thread sleep count: 7923 > 30
              Source: C:\Users\user\AppData\Roaming\ammero.exe TID: 2288Thread sleep count: 39 > 30
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exe TID: 4868Thread sleep time: -15679732462653109s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exe TID: 5224Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5572Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3704Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\ammero.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\googles.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\googles.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\googles.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\ammero.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeThread delayed: delay time: 922337203685477
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
              Source: reg.exe, 00000003.00000002.238586747.0000000003610000.00000002.00000001.sdmp, googles.exe, 00000007.00000002.504912111.00000000063C0000.00000002.00000001.sdmp, googles.exe, 0000000F.00000002.329073080.0000000006390000.00000002.00000001.sdmp, ammero.exe, 00000010.00000002.498184394.0000000005E50000.00000002.00000001.sdmp, InstallUtil.exe, 00000011.00000002.501927850.0000000006790000.00000002.00000001.sdmp, InstallUtil.exe, 00000016.00000002.363387209.0000000004FB0000.00000002.00000001.sdmp, dhcpmon.exe, 00000018.00000002.368041569.0000000004FD0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
              Source: reg.exe, 00000003.00000002.238586747.0000000003610000.00000002.00000001.sdmp, googles.exe, 00000007.00000002.504912111.00000000063C0000.00000002.00000001.sdmp, googles.exe, 0000000F.00000002.329073080.0000000006390000.00000002.00000001.sdmp, ammero.exe, 00000010.00000002.498184394.0000000005E50000.00000002.00000001.sdmp, InstallUtil.exe, 00000011.00000002.501927850.0000000006790000.00000002.00000001.sdmp, InstallUtil.exe, 00000016.00000002.363387209.0000000004FB0000.00000002.00000001.sdmp, dhcpmon.exe, 00000018.00000002.368041569.0000000004FD0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
              Source: reg.exe, 00000003.00000002.238586747.0000000003610000.00000002.00000001.sdmp, googles.exe, 00000007.00000002.504912111.00000000063C0000.00000002.00000001.sdmp, googles.exe, 0000000F.00000002.329073080.0000000006390000.00000002.00000001.sdmp, ammero.exe, 00000010.00000002.498184394.0000000005E50000.00000002.00000001.sdmp, InstallUtil.exe, 00000011.00000002.501927850.0000000006790000.00000002.00000001.sdmp, InstallUtil.exe, 00000016.00000002.363387209.0000000004FB0000.00000002.00000001.sdmp, dhcpmon.exe, 00000018.00000002.368041569.0000000004FD0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
              Source: googles.exe, 00000007.00000002.488779548.00000000015C6000.00000004.00000020.sdmp, InstallUtil.exe, 00000011.00000002.480313831.0000000000ABD000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: reg.exe, 00000003.00000002.238586747.0000000003610000.00000002.00000001.sdmp, googles.exe, 00000007.00000002.504912111.00000000063C0000.00000002.00000001.sdmp, googles.exe, 0000000F.00000002.329073080.0000000006390000.00000002.00000001.sdmp, ammero.exe, 00000010.00000002.498184394.0000000005E50000.00000002.00000001.sdmp, InstallUtil.exe, 00000011.00000002.501927850.0000000006790000.00000002.00000001.sdmp, InstallUtil.exe, 00000016.00000002.363387209.0000000004FB0000.00000002.00000001.sdmp, dhcpmon.exe, 00000018.00000002.368041569.0000000004FD0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess token adjusted: Debug
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess token adjusted: Debug
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess token adjusted: Debug
              Source: C:\Users\user\AppData\Roaming\ammero.exeProcess token adjusted: Debug
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeMemory allocated: page read and write | page guard

              HIPS / PFW / Operating System Protection Evasion:

              barindex
              Allocates memory in foreign processesShow sources
              Source: C:\Users\user\AppData\Roaming\googles.exeMemory allocated: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 400000 protect: page execute and read and write
              Injects a PE file into a foreign processesShow sources
              Source: C:\Users\user\AppData\Roaming\googles.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 400000 value starts with: 4D5A
              Writes to foreign memory regionsShow sources
              Source: C:\Users\user\AppData\Roaming\googles.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 400000
              Source: C:\Users\user\AppData\Roaming\googles.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 402000
              Source: C:\Users\user\AppData\Roaming\googles.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 420000
              Source: C:\Users\user\AppData\Roaming\googles.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 422000
              Source: C:\Users\user\AppData\Roaming\googles.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 69C008
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'googles' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\googles.exe'
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeProcess created: C:\Users\user\AppData\Roaming\googles.exe 'C:\Users\user\AppData\Roaming\googles.exe'
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'googles' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\googles.exe'
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess created: C:\Users\user\AppData\Roaming\ammero.exe 'C:\Users\user\AppData\Roaming\ammero.exe'
              Source: C:\Users\user\AppData\Roaming\googles.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp460B.tmp'
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp48BB.tmp'
              Source: googles.exe, 00000007.00000002.491040657.0000000001EE0000.00000002.00000001.sdmp, ammero.exe, 00000010.00000002.487186041.0000000001850000.00000002.00000001.sdmp, InstallUtil.exe, 00000011.00000002.501868571.000000000664E000.00000004.00000001.sdmpBinary or memory string: Program Manager
              Source: googles.exe, 00000007.00000002.491040657.0000000001EE0000.00000002.00000001.sdmp, ammero.exe, 00000010.00000002.487186041.0000000001850000.00000002.00000001.sdmp, InstallUtil.exe, 00000011.00000002.481849848.00000000010F0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
              Source: googles.exe, 00000007.00000002.491040657.0000000001EE0000.00000002.00000001.sdmp, ammero.exe, 00000010.00000002.487186041.0000000001850000.00000002.00000001.sdmp, InstallUtil.exe, 00000011.00000002.481849848.00000000010F0000.00000002.00000001.sdmpBinary or memory string: Progman
              Source: googles.exe, 00000007.00000002.491040657.0000000001EE0000.00000002.00000001.sdmp, ammero.exe, 00000010.00000002.487186041.0000000001850000.00000002.00000001.sdmp, InstallUtil.exe, 00000011.00000002.481849848.00000000010F0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeQueries volume information: C:\Users\user\Desktop\PO #KV18RE001-A5491.exe VolumeInformation
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Users\user\AppData\Roaming\googles.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Users\user\AppData\Roaming\googles.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\googles.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\ammero.exeQueries volume information: C:\Users\user\AppData\Roaming\ammero.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\ammero.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\ammero.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\ammero.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\ammero.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\ammero.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\ammero.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\ammero.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Users\user\AppData\Local\Temp\InstallUtil.exe VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Users\user\AppData\Local\Temp\InstallUtil.exe VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
              Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
              Source: C:\Users\user\Desktop\PO #KV18RE001-A5491.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

              Stealing of Sensitive Information:

              barindex
              Yara detected AgentTeslaShow sources
              Source: Yara matchFile source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.340634193.00000000009E2000.00000002.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.477797620.00000000009E2000.00000002.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\ammero.exe, type: DROPPED
              Source: Yara matchFile source: 7.2.googles.exe.44e3260.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.ammero.exe.9e0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.447a1d2.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.45eab19.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4653bc9.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44ace01.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46665e1.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46665e1.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46339b2.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44ace01.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.45fd531.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.45eab19.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.449a3e9.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.45fd531.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.ammero.exe.9e0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.449a3e9.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4653bc9.2.raw.unpack, type: UNPACKEDPE
              Yara detected AgentTeslaShow sources
              Source: Yara matchFile source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.340634193.00000000009E2000.00000002.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.477797620.00000000009E2000.00000002.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.489309809.0000000003011000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PO #KV18RE001-A5491.exe PID: 5580, type: MEMORY
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\ammero.exe, type: DROPPED
              Source: Yara matchFile source: 7.2.googles.exe.44e3260.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.ammero.exe.9e0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.447a1d2.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.45eab19.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4653bc9.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44ace01.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46665e1.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46665e1.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46339b2.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44ace01.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.45fd531.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.45eab19.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.449a3e9.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.45fd531.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.ammero.exe.9e0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.449a3e9.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4653bc9.2.raw.unpack, type: UNPACKEDPE
              Yara detected Nanocore RATShow sources
              Source: Yara matchFile source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.306129386.000000000454E000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.477862066.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.495140225.0000000003719000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.502813497.0000000004407000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.501438329.0000000005DC0000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PO #KV18RE001-A5491.exe PID: 5580, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5476, type: MEMORY
              Source: Yara matchFile source: 17.2.InstallUtil.exe.371b78e.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.447a1d2.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44e3260.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46339b2.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.447a1d2.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44ace01.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46665e1.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46339b2.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.45fd531.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.45eab19.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.5dc0000.11.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.37205c4.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.449a3e9.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.3724bed.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.5dc0000.11.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44e3260.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.37205c4.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.5dc4629.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.4409510.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4653bc9.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000010.00000002.489309809.0000000003011000.00000004.00000001.sdmp, type: MEMORY

              Remote Access Functionality:

              barindex
              Detected Nanocore RatShow sources
              Source: PO #KV18RE001-A5491.exe, 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
              Source: googles.exe, 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
              Source: InstallUtil.exe, 00000011.00000002.487174803.0000000002729000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
              Source: InstallUtil.exe, 00000011.00000002.487174803.0000000002729000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
              Yara detected AgentTeslaShow sources
              Source: Yara matchFile source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.340634193.00000000009E2000.00000002.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.477797620.00000000009E2000.00000002.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\ammero.exe, type: DROPPED
              Source: Yara matchFile source: 7.2.googles.exe.44e3260.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.ammero.exe.9e0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.447a1d2.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.45eab19.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4653bc9.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44ace01.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46665e1.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46665e1.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46339b2.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44ace01.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.45fd531.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.45eab19.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.449a3e9.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.45fd531.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.ammero.exe.9e0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.449a3e9.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4653bc9.2.raw.unpack, type: UNPACKEDPE
              Yara detected AgentTeslaShow sources
              Source: Yara matchFile source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.340634193.00000000009E2000.00000002.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.477797620.00000000009E2000.00000002.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.489309809.0000000003011000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PO #KV18RE001-A5491.exe PID: 5580, type: MEMORY
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\ammero.exe, type: DROPPED
              Source: Yara matchFile source: 7.2.googles.exe.44e3260.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.ammero.exe.9e0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.447a1d2.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.45eab19.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4653bc9.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44ace01.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46665e1.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46665e1.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46339b2.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44ace01.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.45fd531.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.45eab19.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.449a3e9.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.45fd531.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.ammero.exe.9e0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.449a3e9.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4653bc9.2.raw.unpack, type: UNPACKEDPE
              Yara detected Nanocore RATShow sources
              Source: Yara matchFile source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.306129386.000000000454E000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.477862066.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.495140225.0000000003719000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.502813497.0000000004407000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.501438329.0000000005DC0000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PO #KV18RE001-A5491.exe PID: 5580, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5476, type: MEMORY
              Source: Yara matchFile source: 17.2.InstallUtil.exe.371b78e.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.447a1d2.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44e3260.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46339b2.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.447a1d2.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44ace01.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46665e1.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.46339b2.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.45fd531.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.45eab19.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4620f9a.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.5dc0000.11.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.37205c4.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.449a3e9.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.3724bed.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.5dc0000.11.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44d0848.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.44e3260.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.44677ba.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.37205c4.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PO #KV18RE001-A5491.exe.45b7eea.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.InstallUtil.exe.5dc4629.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.googles.exe.4409510.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.PO #KV18RE001-A5491.exe.4653bc9.2.raw.unpack, type: UNPACKEDPE

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1Windows Management Instrumentation211Valid Accounts1Valid Accounts1Disable or Modify Tools1Input Capture21File and Directory Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/Job1Scheduled Task/Job1Access Token Manipulation1Obfuscated Files or Information2LSASS MemorySystem Information Discovery113Remote Desktop ProtocolInput Capture21Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Registry Run Keys / Startup Folder1Process Injection312Software Packing1Security Account ManagerSecurity Software Discovery221SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Scheduled Task/Job1Masquerading2NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptRegistry Run Keys / Startup Folder1Valid Accounts1LSA SecretsVirtualization/Sandbox Evasion141SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonModify Registry1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation1DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobVirtualization/Sandbox Evasion141Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection312/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 411850 Sample: PO #KV18RE001-A5491.exe Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 68 Found malware configuration 2->68 70 Malicious sample detected (through community Yara rule) 2->70 72 Multi AV Scanner detection for submitted file 2->72 74 8 other signatures 2->74 8 googles.exe 14 4 2->8         started        13 PO #KV18RE001-A5491.exe 15 7 2->13         started        15 InstallUtil.exe 2->15         started        17 2 other processes 2->17 process3 dnsIp4 66 192.168.2.1 unknown unknown 8->66 54 C:\Users\user\AppData\Roaming\ammero.exe, PE32 8->54 dropped 88 Multi AV Scanner detection for dropped file 8->88 90 Machine Learning detection for dropped file 8->90 92 Writes to foreign memory regions 8->92 96 2 other signatures 8->96 19 ammero.exe 8->19         started        22 InstallUtil.exe 8->22         started        56 C:\Users\user\AppData\Roaming\googles.exe, PE32 13->56 dropped 58 C:\Users\user\AppData\...\InstallUtil.exe, PE32 13->58 dropped 60 C:\Users\user\...\googles.exe:Zone.Identifier, ASCII 13->60 dropped 62 C:\Users\user\...\PO #KV18RE001-A5491.exe.log, ASCII 13->62 dropped 94 Hides that the sample has been downloaded from the Internet (zone.identifier) 13->94 26 cmd.exe 1 13->26         started        28 googles.exe 3 13->28         started        30 conhost.exe 15->30         started        32 conhost.exe 17->32         started        34 conhost.exe 17->34         started        file5 signatures6 process7 dnsIp8 76 Antivirus detection for dropped file 19->76 78 Multi AV Scanner detection for dropped file 19->78 80 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 19->80 86 2 other signatures 19->86 64 79.134.225.91, 4488, 49691, 49692 FINK-TELECOM-SERVICESCH Switzerland 22->64 48 C:\Users\user\AppData\Roaming\...\run.dat, International 22->48 dropped 50 C:\Users\user\AppData\Local\...\tmp460B.tmp, XML 22->50 dropped 52 C:\Program Files (x86)\...\dhcpmon.exe, PE32 22->52 dropped 82 Uses schtasks.exe or at.exe to add and modify task schedules 22->82 84 Hides that the sample has been downloaded from the Internet (zone.identifier) 22->84 36 schtasks.exe 22->36         started        38 schtasks.exe 22->38         started        40 conhost.exe 26->40         started        42 reg.exe 1 1 26->42         started        file9 signatures10 process11 process12 44 conhost.exe 36->44         started        46 conhost.exe 38->46         started       

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              PO #KV18RE001-A5491.exe33%VirustotalBrowse
              PO #KV18RE001-A5491.exe26%MetadefenderBrowse
              PO #KV18RE001-A5491.exe38%ReversingLabsWin32.Trojan.Woreflint
              PO #KV18RE001-A5491.exe100%Joe Sandbox ML

              Dropped Files

              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\ammero.exe100%AviraTR/Spy.Gen8
              C:\Users\user\AppData\Roaming\googles.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\ammero.exe100%Joe Sandbox ML
              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%MetadefenderBrowse
              C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%ReversingLabs
              C:\Users\user\AppData\Roaming\ammero.exe76%ReversingLabsByteCode-MSIL.Infostealer.DarkStealer
              C:\Users\user\AppData\Roaming\googles.exe26%MetadefenderBrowse
              C:\Users\user\AppData\Roaming\googles.exe38%ReversingLabsWin32.Trojan.Woreflint

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              16.2.ammero.exe.9e0000.0.unpack100%AviraHEUR/AGEN.1138205Download File
              17.2.InstallUtil.exe.5dc0000.11.unpack100%AviraTR/NanoCore.fadteDownload File
              17.2.InstallUtil.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
              16.0.ammero.exe.9e0000.0.unpack100%AviraHEUR/AGEN.1138205Download File

              Domains

              No Antivirus matches

              URLs

              SourceDetectionScannerLabelLink
              0%Avira URL Cloudsafe
              http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://ns.adobe.c/gj0%Avira URL Cloudsafe
              http://ns.adobe.cobj0%URL Reputationsafe
              http://ns.adobe.cobj0%URL Reputationsafe
              http://ns.adobe.cobj0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
              http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
              http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
              https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
              https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
              https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
              http://MFWCde.com0%Avira URL Cloudsafe
              http://ns.ado/1j0%Avira URL Cloudsafe
              http://ns.adobe.cobjj0%Avira URL Cloudsafe
              http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
              http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
              http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
              http://ns.adobe.c/g0%URL Reputationsafe
              http://ns.adobe.c/g0%URL Reputationsafe
              http://ns.adobe.c/g0%URL Reputationsafe
              http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
              http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
              http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
              https://pki.goog/repository/00%URL Reputationsafe
              https://pki.goog/repository/00%URL Reputationsafe
              https://pki.goog/repository/00%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              79.134.225.910%Avira URL Cloudsafe
              http://ns.ado/10%URL Reputationsafe
              http://ns.ado/10%URL Reputationsafe
              http://ns.ado/10%URL Reputationsafe

              Domains and IPs

              Contacted Domains

              No contacted domains info

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              true
              • Avira URL Cloud: safe
              low
              79.134.225.91true
              • Avira URL Cloud: safe
              unknown

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://127.0.0.1:HTTP/1.1ammero.exe, 00000010.00000002.489309809.0000000003011000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://DynDns.comDynDNSammero.exe, 00000010.00000002.489309809.0000000003011000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://ns.adobe.c/gjgoogles.exe, 00000007.00000003.296832321.00000000075FA000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://ns.adobe.cobjPO #KV18RE001-A5491.exe, 00000000.00000003.232494092.00000000076DA000.00000004.00000001.sdmp, PO #KV18RE001-A5491.exe, 00000000.00000003.297857855.00000000076E1000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haammero.exe, 00000010.00000002.489309809.0000000003011000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://crl.pki.goog/GTS1O1core.crl0googles.exe, 00000007.00000002.488779548.00000000015C6000.00000004.00000020.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://api.ipify.org%GETMozilla/5.0ammero.exe, 00000010.00000002.489309809.0000000003011000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              low
              http://MFWCde.comammero.exe, 00000010.00000002.489309809.0000000003011000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://ns.ado/1jgoogles.exe, 00000007.00000003.296832321.00000000075FA000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://ns.adobe.cobjjgoogles.exe, 00000007.00000003.296832321.00000000075FA000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://pki.goog/gsr2/GTS1O1.crt0googles.exe, 00000007.00000002.488779548.00000000015C6000.00000004.00000020.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://ns.adobe.c/gPO #KV18RE001-A5491.exe, 00000000.00000003.232494092.00000000076DA000.00000004.00000001.sdmp, PO #KV18RE001-A5491.exe, 00000000.00000003.297857855.00000000076E1000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://crl.pki.goog/gsr2/gsr2.crl0?googles.exe, 00000007.00000002.489117933.0000000001603000.00000004.00000020.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://pki.goog/repository/0googles.exe, 00000007.00000002.489117933.0000000001603000.00000004.00000020.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePO #KV18RE001-A5491.exe, 00000000.00000002.300286762.00000000033F1000.00000004.00000001.sdmp, googles.exe, 00000007.00000002.491630441.0000000003401000.00000004.00000001.sdmp, googles.exe, 0000000F.00000002.328020119.0000000003331000.00000004.00000001.sdmpfalse
                high
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipPO #KV18RE001-A5491.exe, 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, googles.exe, 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, ammero.exe, ammero.exe.7.drfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://schema.org/WebPagegoogles.exe, 0000000F.00000002.328049985.0000000003362000.00000004.00000001.sdmp, googles.exe, 0000000F.00000002.328086949.0000000003378000.00000004.00000001.sdmpfalse
                  high
                  http://ns.ado/1PO #KV18RE001-A5491.exe, 00000000.00000003.232494092.00000000076DA000.00000004.00000001.sdmp, PO #KV18RE001-A5491.exe, 00000000.00000003.297857855.00000000076E1000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  79.134.225.91
                  unknownSwitzerland
                  6775FINK-TELECOM-SERVICESCHtrue

                  Private

                  IP
                  192.168.2.1

                  General Information

                  Joe Sandbox Version:32.0.0 Black Diamond
                  Analysis ID:411850
                  Start date:12.05.2021
                  Start time:07:45:17
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 14m 35s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:PO #KV18RE001-A5491.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:36
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@25/16@0/2
                  EGA Information:Failed
                  HDC Information:
                  • Successful, ratio: 0.5% (good quality ratio 0.3%)
                  • Quality average: 40.9%
                  • Quality standard deviation: 34.2%
                  HCA Information:
                  • Successful, ratio: 96%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  Warnings:
                  Show All
                  • Excluded IPs from analysis (whitelisted): 172.217.168.68, 204.79.197.200, 13.107.21.200, 23.218.208.56, 131.253.33.200, 13.107.22.200, 2.20.142.209, 2.20.143.16, 40.88.32.150, 52.255.188.83, 168.61.161.212
                  • Excluded domains from analysis (whitelisted): www.bing.com, au.download.windowsupdate.com.edgesuite.net, fs.microsoft.com, dual-a-0001.a-msedge.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus17.cloudapp.net, a767.dscg3.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, dual-a-0001.dc-msedge.net, skypedataprdcoleus15.cloudapp.net, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, blobcollector.events.data.trafficmanager.net, www.google.com, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net
                  • Report creation exceeded maximum time and may have missing disassembly code information.
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  07:46:22AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run googles C:\Users\user\AppData\Roaming\googles.exe
                  07:46:26API Interceptor46x Sleep call for process: PO #KV18RE001-A5491.exe modified
                  07:46:31AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run googles C:\Users\user\AppData\Roaming\googles.exe
                  07:46:53API Interceptor46x Sleep call for process: googles.exe modified
                  07:47:17Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\AppData\Local\Temp\InstallUtil.exe" s>$(Arg0)
                  07:47:17API Interceptor472x Sleep call for process: InstallUtil.exe modified
                  07:47:19Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                  07:47:19AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                  07:47:20API Interceptor382x Sleep call for process: ammero.exe modified

                  Joe Sandbox View / Context

                  IPs

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  79.134.225.91PO#KV18RE001_A5491NGOCQUANGTRADEPRODUCTIONSERVICE5.exeGet hashmaliciousBrowse
                    UPSSHIPMENT_CONFIRMATION_CBJ19051700013_11Z35Q6Q80446518864888.docGet hashmaliciousBrowse
                      ENrYP02wGO.exeGet hashmaliciousBrowse
                        UPSSHIPMENT_CONFIRMATION_CBJ19051700013_11Z35Q6Q80446518864.docGet hashmaliciousBrowse
                          DHL file.exeGet hashmaliciousBrowse
                            Swift 5893038993.exeGet hashmaliciousBrowse
                              PO 67961.exeGet hashmaliciousBrowse
                                PO 77390029.exeGet hashmaliciousBrowse
                                  SWIFT TT.exeGet hashmaliciousBrowse
                                    Ugovor o prodajnom nalogu PO-0091870_25 Meka koza.exeGet hashmaliciousBrowse
                                      51INVOICES.exeGet hashmaliciousBrowse

                                        Domains

                                        No context

                                        ASN

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        FINK-TELECOM-SERVICESCHDevizni izvod za partiju 0050100073053.exeGet hashmaliciousBrowse
                                        • 79.134.225.71
                                        QwUl4FaToe.exeGet hashmaliciousBrowse
                                        • 79.134.225.71
                                        IMG_1035852_607.exeGet hashmaliciousBrowse
                                        • 79.134.225.10
                                        RFQEMFA.Elektrik.exeGet hashmaliciousBrowse
                                        • 79.134.225.17
                                        Waybill Document 22700456.exeGet hashmaliciousBrowse
                                        • 79.134.225.7
                                        Give Offer CVE6535 _TVOP-MIO, pdf.exeGet hashmaliciousBrowse
                                        • 79.134.225.8
                                        Waybill Document 22700456.exeGet hashmaliciousBrowse
                                        • 79.134.225.7
                                        RFQEMFA.Elektrik.pdf.exeGet hashmaliciousBrowse
                                        • 79.134.225.17
                                        w85rzxid7y.exeGet hashmaliciousBrowse
                                        • 79.134.225.81
                                        Remittance E-MAIL Layout - 10_.jarGet hashmaliciousBrowse
                                        • 79.134.225.106
                                        s65eJyjKga.exeGet hashmaliciousBrowse
                                        • 79.134.225.47
                                        new order.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.47
                                        Ot3srIM10B.exeGet hashmaliciousBrowse
                                        • 79.134.225.47
                                        Remittance E-MAIL Layout - 10_.jarGet hashmaliciousBrowse
                                        • 79.134.225.106
                                        wnQXyfONbS.exeGet hashmaliciousBrowse
                                        • 79.134.225.82
                                        kwK4iGa9DL.exeGet hashmaliciousBrowse
                                        • 79.134.225.47
                                        Remittance E-MAIL Layout - 10_.jarGet hashmaliciousBrowse
                                        • 79.134.225.106
                                        4z9Saf2vu3.exeGet hashmaliciousBrowse
                                        • 79.134.225.47
                                        NewOrderSupplypdf.exeGet hashmaliciousBrowse
                                        • 79.134.225.52
                                        Pu5UMH4fWK.exeGet hashmaliciousBrowse
                                        • 79.134.225.14

                                        JA3 Fingerprints

                                        No context

                                        Dropped Files

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        C:\Program Files (x86)\DHCP Monitor\dhcpmon.execontract_documents_993454938_pdf.exeGet hashmaliciousBrowse
                                          DOCUMENTS_BY_FEDEX_JPG.exeGet hashmaliciousBrowse
                                            mylvKlCNki.exeGet hashmaliciousBrowse
                                              PptV7lNtMgTlPuO.exeGet hashmaliciousBrowse
                                                6BD0F63D69EBAA8E28B21E9B0F5C02E05C1213535B288.exeGet hashmaliciousBrowse
                                                  PO#KV18RE001_A5491NGOCQUANGTRADEPRODUCTIONSERVICE5.exeGet hashmaliciousBrowse
                                                    M2Ia9NwhS0.exeGet hashmaliciousBrowse
                                                      Z1ZdFWqLdS.exeGet hashmaliciousBrowse
                                                        ENrYP02wGO.exeGet hashmaliciousBrowse
                                                          Quotation#73280126721_Oriental_Fastech_Manufacturing.exeGet hashmaliciousBrowse
                                                            Quotation#73280126721_Oriental_Fastech_Manufacturings.exeGet hashmaliciousBrowse
                                                              OFF8mgLVHc.exeGet hashmaliciousBrowse
                                                                06BUvGWk7B.exeGet hashmaliciousBrowse
                                                                  4yO0B3vPLc.exeGet hashmaliciousBrowse
                                                                    RWtutTA7Hl.exeGet hashmaliciousBrowse
                                                                      APRILQUOTATIONS#QQO2103060_Hangzhou_Zhongniu_Import_Export_Co.exeGet hashmaliciousBrowse
                                                                        QUOTATION#QQO2103060_Hangzhou_Zhongniu_Import_Export_Co.exeGet hashmaliciousBrowse
                                                                          NEWQUOTATIONs#280321_RFQ_PRODUCTS_ENQUIRY_TRINITY_VIETNAM_CO.exeGet hashmaliciousBrowse
                                                                            APRILQUOTATION#QQO2103060_Hangzhou_Zhongniu_Import_Export_Co.exeGet hashmaliciousBrowse
                                                                              DHL_Express_Shipment_Invoice_Confirmation_CBJ190517000131_74700456XXXX.exeGet hashmaliciousBrowse

                                                                                Created / dropped Files

                                                                                C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                Process:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):41064
                                                                                Entropy (8bit):6.164873449128079
                                                                                Encrypted:false
                                                                                SSDEEP:384:FtpFVLK0MsihB9VKS7xdgE7KJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+sPZTd:ZBMs2SqdD86Iq8gZZFyViML3an
                                                                                MD5:EFEC8C379D165E3F33B536739AEE26A3
                                                                                SHA1:C875908ACBA5CAC1E0B40F06A83F0F156A2640FA
                                                                                SHA-256:46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
                                                                                SHA-512:497847EC115D9AF78899E6DC20EC32A60B16954F83CF5169A23DD3F1459CB632DAC95417BD898FD1895C9FE2262FCBF7838FCF6919FB3B851A0557FBE07CCFFA
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Joe Sandbox View:
                                                                                • Filename: contract_documents_993454938_pdf.exe, Detection: malicious, Browse
                                                                                • Filename: DOCUMENTS_BY_FEDEX_JPG.exe, Detection: malicious, Browse
                                                                                • Filename: mylvKlCNki.exe, Detection: malicious, Browse
                                                                                • Filename: PptV7lNtMgTlPuO.exe, Detection: malicious, Browse
                                                                                • Filename: 6BD0F63D69EBAA8E28B21E9B0F5C02E05C1213535B288.exe, Detection: malicious, Browse
                                                                                • Filename: PO#KV18RE001_A5491NGOCQUANGTRADEPRODUCTIONSERVICE5.exe, Detection: malicious, Browse
                                                                                • Filename: M2Ia9NwhS0.exe, Detection: malicious, Browse
                                                                                • Filename: Z1ZdFWqLdS.exe, Detection: malicious, Browse
                                                                                • Filename: ENrYP02wGO.exe, Detection: malicious, Browse
                                                                                • Filename: Quotation#73280126721_Oriental_Fastech_Manufacturing.exe, Detection: malicious, Browse
                                                                                • Filename: Quotation#73280126721_Oriental_Fastech_Manufacturings.exe, Detection: malicious, Browse
                                                                                • Filename: OFF8mgLVHc.exe, Detection: malicious, Browse
                                                                                • Filename: 06BUvGWk7B.exe, Detection: malicious, Browse
                                                                                • Filename: 4yO0B3vPLc.exe, Detection: malicious, Browse
                                                                                • Filename: RWtutTA7Hl.exe, Detection: malicious, Browse
                                                                                • Filename: APRILQUOTATIONS#QQO2103060_Hangzhou_Zhongniu_Import_Export_Co.exe, Detection: malicious, Browse
                                                                                • Filename: QUOTATION#QQO2103060_Hangzhou_Zhongniu_Import_Export_Co.exe, Detection: malicious, Browse
                                                                                • Filename: NEWQUOTATIONs#280321_RFQ_PRODUCTS_ENQUIRY_TRINITY_VIETNAM_CO.exe, Detection: malicious, Browse
                                                                                • Filename: APRILQUOTATION#QQO2103060_Hangzhou_Zhongniu_Import_Export_Co.exe, Detection: malicious, Browse
                                                                                • Filename: DHL_Express_Shipment_Invoice_Confirmation_CBJ190517000131_74700456XXXX.exe, Detection: malicious, Browse
                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..T...........r... ........@.. ....................................`.................................4r..O....................b..h>...........p............................................... ............... ..H............text....R... ...T.................. ..`.rsrc................V..............@..@.reloc...............`..............@..B................hr......H........"..|J..........lm.......o......................................2~.....o....*.r...p(....*VrK..p(....s.........*..0..........(....(....o....o....(....o.... .....T(....o....(....o....o ...o!....4(....o....(....o....o ...o".....(....rm..ps#...o....($........(%....o&....ry..p......%.r...p.%.(.....(....('....((.......o)...('........*.*................"..(*...*..{Q...-...}Q.....(+...(....(,....(+...*"..(-...*..(....*..(.....r...p.(/...o0...s....}T...*....0.. .......~S...-.s
                                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log
                                                                                Process:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:modified
                                                                                Size (bytes):329
                                                                                Entropy (8bit):5.324195011891804
                                                                                Encrypted:false
                                                                                SSDEEP:6:Q3La/xwc1K9rDLIP12MUAvvr3tDLIP12MUAvvR+uTL2LDY3U21v:Q3La/h1K9rDLI4M9tDLI4MWuPk21v
                                                                                MD5:0F3825E2D8885E05820523A5D8DFEF9C
                                                                                SHA1:E6AA2D5D00CE5F875C75B9490F21F2D6B3F0DED3
                                                                                SHA-256:2F3769543004FF49CB3B6EF06AC5FD6A402DB0C2546E365639338CA2F4049EBE
                                                                                SHA-512:D8FBAEEABF2D33EAF4FF5AADEBF86C233145502560A42B88EBDE455AE2B001F52728E4CE6C59DBCCA37CBF25BA485F5FC5527E992AB66957C6252CF1956F237C
                                                                                Malicious:false
                                                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Configuration.Install, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..
                                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO #KV18RE001-A5491.exe.log
                                                                                Process:C:\Users\user\Desktop\PO #KV18RE001-A5491.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:modified
                                                                                Size (bytes):1402
                                                                                Entropy (8bit):5.338819835253785
                                                                                Encrypted:false
                                                                                SSDEEP:24:MLUE4K5E4Ks2E1qE4bE4Ko84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7csX3:MIHK5HKXE1qHbHKoviYHKhQnoPtHoxHH
                                                                                MD5:EB9F730FB5388BB883772033EA3CCE59
                                                                                SHA1:7DFF24FBD26D0ED7065882AE0A9A52E459D7F2A9
                                                                                SHA-256:B7192E58E5E91CF2CA113CA1C9575AADEAD3C417076AB83D8EF0720D5E473887
                                                                                SHA-512:1FB4FF9E7E85C4F4B2395B948A4B69180E602259FFC582A067B96420C60BA4B49D091F3D525333E07930AA21A8254AF1C9F90B29CCD31AA97C368CB1CB7EF322
                                                                                Malicious:true
                                                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configu
                                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                                                                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:modified
                                                                                Size (bytes):329
                                                                                Entropy (8bit):5.324195011891804
                                                                                Encrypted:false
                                                                                SSDEEP:6:Q3La/xwc1K9rDLIP12MUAvvr3tDLIP12MUAvvR+uTL2LDY3U21v:Q3La/h1K9rDLI4M9tDLI4MWuPk21v
                                                                                MD5:0F3825E2D8885E05820523A5D8DFEF9C
                                                                                SHA1:E6AA2D5D00CE5F875C75B9490F21F2D6B3F0DED3
                                                                                SHA-256:2F3769543004FF49CB3B6EF06AC5FD6A402DB0C2546E365639338CA2F4049EBE
                                                                                SHA-512:D8FBAEEABF2D33EAF4FF5AADEBF86C233145502560A42B88EBDE455AE2B001F52728E4CE6C59DBCCA37CBF25BA485F5FC5527E992AB66957C6252CF1956F237C
                                                                                Malicious:false
                                                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Configuration.Install, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..
                                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\googles.exe.log
                                                                                Process:C:\Users\user\AppData\Roaming\googles.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1402
                                                                                Entropy (8bit):5.338819835253785
                                                                                Encrypted:false
                                                                                SSDEEP:24:MLUE4K5E4Ks2E1qE4bE4Ko84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7csX3:MIHK5HKXE1qHbHKoviYHKhQnoPtHoxHH
                                                                                MD5:EB9F730FB5388BB883772033EA3CCE59
                                                                                SHA1:7DFF24FBD26D0ED7065882AE0A9A52E459D7F2A9
                                                                                SHA-256:B7192E58E5E91CF2CA113CA1C9575AADEAD3C417076AB83D8EF0720D5E473887
                                                                                SHA-512:1FB4FF9E7E85C4F4B2395B948A4B69180E602259FFC582A067B96420C60BA4B49D091F3D525333E07930AA21A8254AF1C9F90B29CCD31AA97C368CB1CB7EF322
                                                                                Malicious:false
                                                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configu
                                                                                C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                                Process:C:\Users\user\Desktop\PO #KV18RE001-A5491.exe
                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):41064
                                                                                Entropy (8bit):6.164873449128079
                                                                                Encrypted:false
                                                                                SSDEEP:384:FtpFVLK0MsihB9VKS7xdgE7KJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+sPZTd:ZBMs2SqdD86Iq8gZZFyViML3an
                                                                                MD5:EFEC8C379D165E3F33B536739AEE26A3
                                                                                SHA1:C875908ACBA5CAC1E0B40F06A83F0F156A2640FA
                                                                                SHA-256:46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
                                                                                SHA-512:497847EC115D9AF78899E6DC20EC32A60B16954F83CF5169A23DD3F1459CB632DAC95417BD898FD1895C9FE2262FCBF7838FCF6919FB3B851A0557FBE07CCFFA
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..T...........r... ........@.. ....................................`.................................4r..O....................b..h>...........p............................................... ............... ..H............text....R... ...T.................. ..`.rsrc................V..............@..@.reloc...............`..............@..B................hr......H........"..|J..........lm.......o......................................2~.....o....*.r...p(....*VrK..p(....s.........*..0..........(....(....o....o....(....o.... .....T(....o....(....o....o ...o!....4(....o....(....o....o ...o".....(....rm..ps#...o....($........(%....o&....ry..p......%.r...p.%.(.....(....('....((.......o)...('........*.*................"..(*...*..{Q...-...}Q.....(+...(....(,....(+...*"..(-...*..(....*..(.....r...p.(/...o0...s....}T...*....0.. .......~S...-.s
                                                                                C:\Users\user\AppData\Local\Temp\tmp460B.tmp
                                                                                Process:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1312
                                                                                Entropy (8bit):5.101566624560937
                                                                                Encrypted:false
                                                                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0aKxtn:cbk4oL600QydbQxIYODOLedq3BKj
                                                                                MD5:EC44C4BB6E92CFD7C187D5DD2AFB165C
                                                                                SHA1:51F8AAA4A9F14938B0B494ACAA514CDF06A83BE3
                                                                                SHA-256:CA07C8EB4087C95C4B991B4F791DD711E31A2D95F3E0AF0583B869A050488EB5
                                                                                SHA-512:A9419C23FD0F33C73CF2F48E19858E3E66301512DE44E7CCC83E48008644DFD8A1C12BB41812A2D69968EF78C9DA0DBC94947E6F55B20DD887E732DA8F3731BF
                                                                                Malicious:true
                                                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                C:\Users\user\AppData\Local\Temp\tmp48BB.tmp
                                                                                Process:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1310
                                                                                Entropy (8bit):5.109425792877704
                                                                                Encrypted:false
                                                                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                                                MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                                                SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                                                SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                                                SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                                                Malicious:false
                                                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                Process:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                                File Type:International EBCDIC text, with NEL line terminators, with overstriking
                                                                                Category:dropped
                                                                                Size (bytes):8
                                                                                Entropy (8bit):3.0
                                                                                Encrypted:false
                                                                                SSDEEP:3:X:X
                                                                                MD5:76090848624A5340999AFF25A07205A5
                                                                                SHA1:F40833A39981B70FE4ACCDA865372AE5A2F35A40
                                                                                SHA-256:1988DB99C7FCA406D763F07776718FC279709D2547920592F4C454EA8C1E636B
                                                                                SHA-512:582D7A76645C1E5B44862C22AE03FB1CA40AD146C0BBF668B5A0454A0BFAFE114F652F13D3F825F3F3251EE75A97809016FB343DD517F9EF4DAB4DA17E8F0192
                                                                                Malicious:true
                                                                                Preview: ....T..H
                                                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                                                Process:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):49
                                                                                Entropy (8bit):4.361973558701858
                                                                                Encrypted:false
                                                                                SSDEEP:3:oNWXp5cViE2J5xAIOWRxRI0dAn:oNWXp+N23f5RndA
                                                                                MD5:8069A620598F6D0795A045BC4C040FCE
                                                                                SHA1:BE6C7D1B6E3A49925674F335C601A53E985A2496
                                                                                SHA-256:85E54950497C2B5262439CC09BB7E0779225EAFF0C50B75D59DECE689F2B0625
                                                                                SHA-512:D9AB55D7A597CB3DB20E069AA4893654C7033E42738AD5CF3AA489C5745E3D85CBAD12530542241CD2133C52E108368AA5DB7255692177745A1EEAAFB3398306
                                                                                Malicious:false
                                                                                Preview: C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                                C:\Users\user\AppData\Roaming\ammero.exe
                                                                                Process:C:\Users\user\AppData\Roaming\googles.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):221696
                                                                                Entropy (8bit):6.062069753596832
                                                                                Encrypted:false
                                                                                SSDEEP:3072:Q9WEWiW0bRq1Do6UFJ7YjJhUi3EmkM7Gw+MevJgm3hHyT+rsXngL4J1tShtUh/q:Qoq6UoPU+n7AMOXBCXgC1EXU
                                                                                MD5:605E939E44CD9B02C55CE0A09019AD47
                                                                                SHA1:9AC8FF474631ED0C3D27A7290979B4880B9784F6
                                                                                SHA-256:5AB99263D0101E00809C2FE1F068BBCB601208C3FB0EFD753B36169A3A69C589
                                                                                SHA-512:5196B9B698A71DC4510A57ACABAEE22EC2CD3F35C7C82C0CCBC00673EE97B471019A79E4CDB1EC6B5765EF70F1B5AEBC19F56B0FA6A9932844C8AE07BA8B2B9D
                                                                                Malicious:true
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Roaming\ammero.exe, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Roaming\ammero.exe, Author: Joe Security
                                                                                Antivirus:
                                                                                • Antivirus: Avira, Detection: 100%
                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                • Antivirus: ReversingLabs, Detection: 76%
                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...+L.`.................X...........v... ........@.. ....................................@..................................u..O.......@............................................................................ ............... ..H............text...$V... ...X.................. ..`.rsrc...@............Z..............@..@.reloc...............`..............@..B.................v......H...........@.............................................................(....*..(....*.s.........s.........s.........s.........*...0..,.........+......,........,........,.+.+.~....o....*.0..,.........+......,........,........,.+.+.~....o....*.0..,.........+......,........,........,.+.+.~....o....*.0..,.........+......,........,........,.+.+.~....o....*.0............+......,........,........,.+.+...(....(....*...0..(.........+......,........,........,.+.+..(....*.0..,.......
                                                                                C:\Users\user\AppData\Roaming\googles.exe
                                                                                Process:C:\Users\user\Desktop\PO #KV18RE001-A5491.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):1270784
                                                                                Entropy (8bit):6.434519417949751
                                                                                Encrypted:false
                                                                                SSDEEP:24576:j0s3e0bj5uLJy3AmKANAlN8ek7CPWUli/v:I+OZlANAv8eb+Ul6
                                                                                MD5:9D9CB0F32A77D7D81296095768D3583E
                                                                                SHA1:8386CDBC85FAEDE7527AA83B4646DFF3F9EDC910
                                                                                SHA-256:0CBBDD2C9615F4D2DE4E0232ACE6B69889A54538444838AC6616A5AA39109C98
                                                                                SHA-512:1438EAB7E432FE118437CE17EE9459605FCC8758658F6BAE7C1081967BF7A446C3C015093EE51EBFEEA221A6FF76839F934644B0AF53D78DC8001D08B74A810E
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                • Antivirus: Metadefender, Detection: 26%, Browse
                                                                                • Antivirus: ReversingLabs, Detection: 38%
                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....m.,.................R...........q... ........@.. ....................................`.................................tq..W.................................................................................... ............... ..H............text....Q... ...R.................. ..`.rsrc................T..............@..@.reloc...............b..............@..B.................q......H.......|...............t...............................................(.$.(.'...9...m.>.... ...=..q.w.p...A.v.K...9.qHwHsH.p.yHG}KH].D.T.T.T.e.[.W.A4X.r.Ssl.e.[.W.A/X.r.Stl.e.[.W.A5X.r.Snl>e.[.W.A0.$.4...7....A......>.|.$..w.4....9...-..{.k.~.L..#.*F.I.W....=Y..#.*B.u.A...+=.........9......x.0....*...(...i......7.*._.Q.X.|..:.3f.O.r...8$m..:.3d.R.K..W.W.W.BA[.q.P.oqf.X.T.B^[.q.P.opf.X.T......g..0.....'......f..0....*5&5 5@..2.....:-6$ .9K..2....1.6.:.....\......
                                                                                C:\Users\user\AppData\Roaming\googles.exe:Zone.Identifier
                                                                                Process:C:\Users\user\Desktop\PO #KV18RE001-A5491.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):26
                                                                                Entropy (8bit):3.95006375643621
                                                                                Encrypted:false
                                                                                SSDEEP:3:ggPYV:rPYV
                                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                Malicious:true
                                                                                Preview: [ZoneTransfer]....ZoneId=0
                                                                                \Device\ConDrv
                                                                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):2017
                                                                                Entropy (8bit):4.663189584482275
                                                                                Encrypted:false
                                                                                SSDEEP:48:zK4Qu4D4ql0+1AcJRy0EJP64gFljVlWo3ggxUnQK2qmBvgw1+5:zKJDEcTytNe3Wo3uQVBIe+5
                                                                                MD5:9C305D95E7DA8FCA9651F7F426BB25BC
                                                                                SHA1:FDB5C18C26CF5B83EF5DC297C0F9CEBEF6A97FFC
                                                                                SHA-256:444F71CF504D22F0EE88024D61501D3B79AE5D1AFD521E72499F325F6B0B82BE
                                                                                SHA-512:F2829518AE0F6DD35C1DE1175FC8BE3E52EDCAFAD0B2455AC593F5E5D4BD480B014F52C3AE24E742B914685513BE5DF862373E75C45BB7908C775D7E2E404DB3
                                                                                Malicious:false
                                                                                Preview: Microsoft (R) .NET Framework Installation utility Version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....Usage: InstallUtil [/u | /uninstall] [option [...]] assembly [[option [...]] assembly] [...]]....InstallUtil executes the installers in each given assembly...If the /u or /uninstall switch is specified, it uninstalls..the assemblies, otherwise it installs them. Unlike other..options, /u applies to all assemblies, regardless of where it..appears on the command line.....Installation is done in a transactioned way: If one of the..assemblies fails to install, the installations of all other..assemblies are rolled back. Uninstall is not transactioned.....Options take the form /switch=[value]. Any option that occurs..before the name of an assembly will apply to that assembly's..installation. Options are cumulative but overridable - options..specified for one assembly will apply to the next as well unless..the option is specified with a new value. The default for

                                                                                Static File Info

                                                                                General

                                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Entropy (8bit):6.434519417949751
                                                                                TrID:
                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                                File name:PO #KV18RE001-A5491.exe
                                                                                File size:1270784
                                                                                MD5:9d9cb0f32a77d7d81296095768d3583e
                                                                                SHA1:8386cdbc85faede7527aa83b4646dff3f9edc910
                                                                                SHA256:0cbbdd2c9615f4d2de4e0232ace6b69889a54538444838ac6616a5aa39109c98
                                                                                SHA512:1438eab7e432fe118437ce17ee9459605fcc8758658f6bae7c1081967bf7a446c3c015093ee51ebfeea221a6ff76839f934644b0af53d78dc8001d08b74a810e
                                                                                SSDEEP:24576:j0s3e0bj5uLJy3AmKANAlN8ek7CPWUli/v:I+OZlANAv8eb+Ul6
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....m.,.................R...........q... ........@.. ....................................`................................

                                                                                File Icon

                                                                                Icon Hash:d0c0ecccd4c4c454

                                                                                Static PE Info

                                                                                General

                                                                                Entrypoint:0x5271ce
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                                                Time Stamp:0x2CDB6D86 [Sat Nov 6 09:25:26 1993 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:v4.0.30319
                                                                                OS Version Major:4
                                                                                OS Version Minor:0
                                                                                File Version Major:4
                                                                                File Version Minor:0
                                                                                Subsystem Version Major:4
                                                                                Subsystem Version Minor:0
                                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                Entrypoint Preview

                                                                                Instruction
                                                                                jmp dword ptr [00402000h]
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al

                                                                                Data Directories

                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x1271740x57.text
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1280000x10ca8.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x13a0000xc.reloc
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                Sections

                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x20000x1251d40x125200False0.591487040245data6.4539132428IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                .rsrc0x1280000x10ca80x10e00False0.141941550926data3.7071684256IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .reloc0x13a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                Resources

                                                                                NameRVASizeTypeLanguageCountry
                                                                                RT_ICON0x1280e80x10828data
                                                                                RT_GROUP_ICON0x1389100x14data
                                                                                RT_VERSION0x1389240x384data

                                                                                Imports

                                                                                DLLImport
                                                                                mscoree.dll_CorExeMain

                                                                                Version Infos

                                                                                DescriptionData
                                                                                Translation0x0000 0x04b0
                                                                                LegalCopyrightCopyright 1999 <7DD5;=J3<E?J;H>9=B
                                                                                Assembly Version1.0.0.0
                                                                                InternalNameAABBA.exe
                                                                                FileVersion7.10.13.17
                                                                                CompanyName<7DD5;=J3<E?J;H>9=B
                                                                                CommentsA:C>4:G6CE47?=?D56=AD9J7
                                                                                ProductName65JGE8@H93FJ335
                                                                                ProductVersion7.10.13.17
                                                                                FileDescription65JGE8@H93FJ335
                                                                                OriginalFilenameAABBA.exe

                                                                                Network Behavior

                                                                                Network Port Distribution

                                                                                TCP Packets

                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                May 12, 2021 07:47:19.134324074 CEST496914488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:19.215867043 CEST44884969179.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:19.716223001 CEST496914488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:19.796866894 CEST44884969179.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:20.310082912 CEST496914488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:20.391540051 CEST44884969179.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:24.968660116 CEST496924488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:25.049097061 CEST44884969279.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:25.560457945 CEST496924488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:25.641999960 CEST44884969279.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:26.154200077 CEST496924488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:26.234621048 CEST44884969279.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:30.274878025 CEST496934488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:30.359219074 CEST44884969379.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:30.873501062 CEST496934488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:30.956877947 CEST44884969379.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:31.467262983 CEST496934488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:31.550713062 CEST44884969379.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:35.562935114 CEST496944488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:35.645302057 CEST44884969479.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:36.155051947 CEST496944488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:36.240921974 CEST44884969479.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:36.748944998 CEST496944488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:36.832464933 CEST44884969479.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:40.845041037 CEST496954488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:40.928467989 CEST44884969579.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:41.436881065 CEST496954488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:41.520199060 CEST44884969579.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:42.030592918 CEST496954488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:42.113818884 CEST44884969579.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:46.126332998 CEST496984488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:46.209604979 CEST44884969879.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:46.718466997 CEST496984488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:46.801826954 CEST44884969879.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:47.312284946 CEST496984488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:47.395411968 CEST44884969879.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:51.459636927 CEST497034488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:51.542972088 CEST44884970379.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:52.047068119 CEST497034488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:52.132709980 CEST44884970379.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:52.640842915 CEST497034488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:52.725085974 CEST44884970379.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:57.006196976 CEST497074488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:57.086376905 CEST44884970779.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:57.594396114 CEST497074488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:57.674560070 CEST44884970779.134.225.91192.168.2.3
                                                                                May 12, 2021 07:47:58.188213110 CEST497074488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:47:58.268560886 CEST44884970779.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:02.402754068 CEST497114488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:02.483135939 CEST44884971179.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:02.985466003 CEST497114488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:03.066778898 CEST44884971179.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:03.579226971 CEST497114488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:03.659740925 CEST44884971179.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:07.679939032 CEST497164488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:07.761409998 CEST44884971679.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:08.267137051 CEST497164488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:08.347863913 CEST44884971679.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:08.860995054 CEST497164488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:08.942778111 CEST44884971679.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:12.956504107 CEST497214488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:13.036941051 CEST44884972179.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:13.548749924 CEST497214488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:13.630450010 CEST44884972179.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:14.142591953 CEST497214488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:14.223201036 CEST44884972179.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:18.239823103 CEST497224488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:18.320306063 CEST44884972279.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:18.823184013 CEST497224488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:18.903579950 CEST44884972279.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:19.408647060 CEST497224488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:19.490019083 CEST44884972279.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:23.506278992 CEST497234488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:23.587838888 CEST44884972379.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:24.096506119 CEST497234488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:24.177037954 CEST44884972379.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:24.690360069 CEST497234488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:24.770771980 CEST44884972379.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:28.785541058 CEST497244488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:28.870794058 CEST44884972479.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:29.378220081 CEST497244488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:29.461577892 CEST44884972479.134.225.91192.168.2.3
                                                                                May 12, 2021 07:48:29.972134113 CEST497244488192.168.2.379.134.225.91
                                                                                May 12, 2021 07:48:30.055479050 CEST44884972479.134.225.91192.168.2.3

                                                                                UDP Packets

                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                May 12, 2021 07:46:10.207685947 CEST5426053192.168.2.38.8.8.8
                                                                                May 12, 2021 07:46:10.265038967 CEST53542608.8.8.8192.168.2.3
                                                                                May 12, 2021 07:46:10.681350946 CEST5190453192.168.2.38.8.8.8
                                                                                May 12, 2021 07:46:10.741502047 CEST53519048.8.8.8192.168.2.3
                                                                                May 12, 2021 07:46:10.751137018 CEST6132853192.168.2.38.8.8.8
                                                                                May 12, 2021 07:46:10.808197021 CEST53613288.8.8.8192.168.2.3
                                                                                May 12, 2021 07:46:34.891448975 CEST5413053192.168.2.38.8.8.8
                                                                                May 12, 2021 07:46:34.953044891 CEST53541308.8.8.8192.168.2.3
                                                                                May 12, 2021 07:46:41.455427885 CEST5696153192.168.2.38.8.8.8
                                                                                May 12, 2021 07:46:41.515317917 CEST53569618.8.8.8192.168.2.3
                                                                                May 12, 2021 07:46:42.179349899 CEST5935353192.168.2.38.8.8.8
                                                                                May 12, 2021 07:46:42.236339092 CEST53593538.8.8.8192.168.2.3
                                                                                May 12, 2021 07:46:42.248321056 CEST5223853192.168.2.38.8.8.8
                                                                                May 12, 2021 07:46:42.308249950 CEST53522388.8.8.8192.168.2.3
                                                                                May 12, 2021 07:46:54.633949041 CEST4987353192.168.2.38.8.8.8
                                                                                May 12, 2021 07:46:54.696114063 CEST53498738.8.8.8192.168.2.3
                                                                                May 12, 2021 07:46:55.204524040 CEST5319653192.168.2.38.8.8.8
                                                                                May 12, 2021 07:46:55.264524937 CEST53531968.8.8.8192.168.2.3
                                                                                May 12, 2021 07:46:55.305525064 CEST5677753192.168.2.38.8.8.8
                                                                                May 12, 2021 07:46:55.354331017 CEST53567778.8.8.8192.168.2.3
                                                                                May 12, 2021 07:46:56.623327971 CEST5864353192.168.2.38.8.8.8
                                                                                May 12, 2021 07:46:56.680459976 CEST53586438.8.8.8192.168.2.3
                                                                                May 12, 2021 07:47:44.146961927 CEST6098553192.168.2.38.8.8.8
                                                                                May 12, 2021 07:47:44.196902990 CEST53609858.8.8.8192.168.2.3
                                                                                May 12, 2021 07:47:45.599400043 CEST5020053192.168.2.38.8.8.8
                                                                                May 12, 2021 07:47:45.648654938 CEST53502008.8.8.8192.168.2.3
                                                                                May 12, 2021 07:47:46.736840010 CEST5128153192.168.2.38.8.8.8
                                                                                May 12, 2021 07:47:46.785608053 CEST53512818.8.8.8192.168.2.3
                                                                                May 12, 2021 07:47:48.368988991 CEST4919953192.168.2.38.8.8.8
                                                                                May 12, 2021 07:47:48.417994022 CEST53491998.8.8.8192.168.2.3
                                                                                May 12, 2021 07:47:49.777586937 CEST5062053192.168.2.38.8.8.8
                                                                                May 12, 2021 07:47:49.830431938 CEST53506208.8.8.8192.168.2.3
                                                                                May 12, 2021 07:47:51.119570971 CEST6493853192.168.2.38.8.8.8
                                                                                May 12, 2021 07:47:51.168591976 CEST53649388.8.8.8192.168.2.3
                                                                                May 12, 2021 07:47:52.200820923 CEST6015253192.168.2.38.8.8.8
                                                                                May 12, 2021 07:47:52.251086950 CEST53601528.8.8.8192.168.2.3
                                                                                May 12, 2021 07:47:53.336946011 CEST5754453192.168.2.38.8.8.8
                                                                                May 12, 2021 07:47:53.389000893 CEST53575448.8.8.8192.168.2.3
                                                                                May 12, 2021 07:47:55.208327055 CEST5598453192.168.2.38.8.8.8
                                                                                May 12, 2021 07:47:55.271629095 CEST53559848.8.8.8192.168.2.3
                                                                                May 12, 2021 07:47:59.463005066 CEST6418553192.168.2.38.8.8.8
                                                                                May 12, 2021 07:47:59.511868954 CEST53641858.8.8.8192.168.2.3
                                                                                May 12, 2021 07:48:00.798407078 CEST6511053192.168.2.38.8.8.8
                                                                                May 12, 2021 07:48:00.857759953 CEST53651108.8.8.8192.168.2.3
                                                                                May 12, 2021 07:48:02.101973057 CEST5836153192.168.2.38.8.8.8
                                                                                May 12, 2021 07:48:02.153584957 CEST53583618.8.8.8192.168.2.3
                                                                                May 12, 2021 07:48:03.620207071 CEST6349253192.168.2.38.8.8.8
                                                                                May 12, 2021 07:48:03.669038057 CEST53634928.8.8.8192.168.2.3
                                                                                May 12, 2021 07:48:04.713371992 CEST6083153192.168.2.38.8.8.8
                                                                                May 12, 2021 07:48:04.765901089 CEST53608318.8.8.8192.168.2.3
                                                                                May 12, 2021 07:48:06.128130913 CEST6010053192.168.2.38.8.8.8
                                                                                May 12, 2021 07:48:06.187184095 CEST53601008.8.8.8192.168.2.3
                                                                                May 12, 2021 07:48:07.357901096 CEST5319553192.168.2.38.8.8.8
                                                                                May 12, 2021 07:48:07.409833908 CEST53531958.8.8.8192.168.2.3
                                                                                May 12, 2021 07:48:08.479552984 CEST5014153192.168.2.38.8.8.8
                                                                                May 12, 2021 07:48:08.528301954 CEST53501418.8.8.8192.168.2.3
                                                                                May 12, 2021 07:48:09.711353064 CEST5302353192.168.2.38.8.8.8
                                                                                May 12, 2021 07:48:09.760333061 CEST53530238.8.8.8192.168.2.3
                                                                                May 12, 2021 07:48:10.804955006 CEST4956353192.168.2.38.8.8.8
                                                                                May 12, 2021 07:48:10.853780985 CEST53495638.8.8.8192.168.2.3
                                                                                May 12, 2021 07:48:12.054651976 CEST5135253192.168.2.38.8.8.8
                                                                                May 12, 2021 07:48:12.103460073 CEST53513528.8.8.8192.168.2.3

                                                                                Code Manipulations

                                                                                Statistics

                                                                                Behavior

                                                                                Click to jump to process

                                                                                System Behavior

                                                                                General

                                                                                Start time:07:46:08
                                                                                Start date:12/05/2021
                                                                                Path:C:\Users\user\Desktop\PO #KV18RE001-A5491.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\Desktop\PO #KV18RE001-A5491.exe'
                                                                                Imagebase:0xfe0000
                                                                                File size:1270784 bytes
                                                                                MD5 hash:9D9CB0F32A77D7D81296095768D3583E
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.306129386.000000000454E000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.306129386.000000000454E000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.306129386.000000000454E000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.305699284.0000000004467000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.271257920.00000000045D8000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                Reputation:low

                                                                                General

                                                                                Start time:07:46:21
                                                                                Start date:12/05/2021
                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'googles' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\googles.exe'
                                                                                Imagebase:0xbd0000
                                                                                File size:232960 bytes
                                                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high

                                                                                General

                                                                                Start time:07:46:21
                                                                                Start date:12/05/2021
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff6b2800000
                                                                                File size:625664 bytes
                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high

                                                                                General

                                                                                Start time:07:46:21
                                                                                Start date:12/05/2021
                                                                                Path:C:\Windows\SysWOW64\reg.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'googles' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\googles.exe'
                                                                                Imagebase:0x1380000
                                                                                File size:59392 bytes
                                                                                MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high

                                                                                General

                                                                                Start time:07:46:39
                                                                                Start date:12/05/2021
                                                                                Path:C:\Users\user\AppData\Roaming\googles.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\AppData\Roaming\googles.exe'
                                                                                Imagebase:0xe00000
                                                                                File size:1270784 bytes
                                                                                MD5 hash:9D9CB0F32A77D7D81296095768D3583E
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.502894900.000000000447A000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.502994681.0000000004561000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.502813497.0000000004407000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.502813497.0000000004407000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.502813497.0000000004407000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                Antivirus matches:
                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                • Detection: 26%, Metadefender, Browse
                                                                                • Detection: 38%, ReversingLabs
                                                                                Reputation:low

                                                                                General

                                                                                Start time:07:46:49
                                                                                Start date:12/05/2021
                                                                                Path:C:\Users\user\AppData\Roaming\googles.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\AppData\Roaming\googles.exe'
                                                                                Imagebase:0xd60000
                                                                                File size:1270784 bytes
                                                                                MD5 hash:9D9CB0F32A77D7D81296095768D3583E
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Reputation:low

                                                                                General

                                                                                Start time:07:47:09
                                                                                Start date:12/05/2021
                                                                                Path:C:\Users\user\AppData\Roaming\ammero.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\AppData\Roaming\ammero.exe'
                                                                                Imagebase:0x9e0000
                                                                                File size:221696 bytes
                                                                                MD5 hash:605E939E44CD9B02C55CE0A09019AD47
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000000.340634193.00000000009E2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000000.340634193.00000000009E2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.477797620.00000000009E2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000002.477797620.00000000009E2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.489309809.0000000003011000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000010.00000002.489309809.0000000003011000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Roaming\ammero.exe, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Roaming\ammero.exe, Author: Joe Security
                                                                                Antivirus matches:
                                                                                • Detection: 100%, Avira
                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                • Detection: 76%, ReversingLabs
                                                                                Reputation:low

                                                                                General

                                                                                Start time:07:47:10
                                                                                Start date:12/05/2021
                                                                                Path:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                                Imagebase:0x480000
                                                                                File size:41064 bytes
                                                                                MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000011.00000002.477862066.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000011.00000002.477862066.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000011.00000002.477862066.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000011.00000002.495140225.0000000003719000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000011.00000002.495140225.0000000003719000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000011.00000002.500714113.0000000005020000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000011.00000002.500714113.0000000005020000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000011.00000002.501438329.0000000005DC0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000011.00000002.501438329.0000000005DC0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000011.00000002.501438329.0000000005DC0000.00000004.00000001.sdmp, Author: Joe Security
                                                                                Antivirus matches:
                                                                                • Detection: 0%, Metadefender, Browse
                                                                                • Detection: 0%, ReversingLabs
                                                                                Reputation:moderate

                                                                                General

                                                                                Start time:07:47:15
                                                                                Start date:12/05/2021
                                                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp460B.tmp'
                                                                                Imagebase:0xcd0000
                                                                                File size:185856 bytes
                                                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high

                                                                                General

                                                                                Start time:07:47:16
                                                                                Start date:12/05/2021
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff6b2800000
                                                                                File size:625664 bytes
                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high

                                                                                General

                                                                                Start time:07:47:16
                                                                                Start date:12/05/2021
                                                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp48BB.tmp'
                                                                                Imagebase:0xcd0000
                                                                                File size:185856 bytes
                                                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high

                                                                                General

                                                                                Start time:07:47:16
                                                                                Start date:12/05/2021
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff6b2800000
                                                                                File size:625664 bytes
                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high

                                                                                General

                                                                                Start time:07:47:17
                                                                                Start date:12/05/2021
                                                                                Path:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Users\user\AppData\Local\Temp\InstallUtil.exe 0
                                                                                Imagebase:0x5f0000
                                                                                File size:41064 bytes
                                                                                MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Reputation:moderate

                                                                                General

                                                                                Start time:07:47:17
                                                                                Start date:12/05/2021
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff6b2800000
                                                                                File size:625664 bytes
                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high

                                                                                General

                                                                                Start time:07:47:19
                                                                                Start date:12/05/2021
                                                                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                                                Imagebase:0x7a0000
                                                                                File size:41064 bytes
                                                                                MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Antivirus matches:
                                                                                • Detection: 0%, Metadefender, Browse
                                                                                • Detection: 0%, ReversingLabs
                                                                                Reputation:moderate

                                                                                General

                                                                                Start time:07:47:20
                                                                                Start date:12/05/2021
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff6b2800000
                                                                                File size:625664 bytes
                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high

                                                                                General

                                                                                Start time:07:47:27
                                                                                Start date:12/05/2021
                                                                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                                Imagebase:0x9d0000
                                                                                File size:41064 bytes
                                                                                MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Reputation:moderate

                                                                                General

                                                                                Start time:07:47:27
                                                                                Start date:12/05/2021
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff6b2800000
                                                                                File size:625664 bytes
                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language

                                                                                Disassembly

                                                                                Code Analysis

                                                                                Reset < >