Loading ...

Play interactive tourEdit tour

Analysis Report NAO09009009.exe

Overview

General Information

Sample Name:NAO09009009.exe
Analysis ID:411952
MD5:592b395d837e34b3770d6113b213b877
SHA1:26498da5dfa58609b38a6f0d294d35e60608cb78
SHA256:e362816d729cd17eeca2ca5361937558f0455463bf4fba74d220163c43f46308
Tags:NanoCore
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • NAO09009009.exe (PID: 5896 cmdline: 'C:\Users\user\Desktop\NAO09009009.exe' MD5: 592B395D837E34B3770D6113B213B877)
    • MSBuild.exe (PID: 1240 cmdline: 'C:\Users\user\Desktop\NAO09009009.exe' MD5: 88BBB7610152B48C2B3879473B17857E)
      • schtasks.exe (PID: 5404 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD89D.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • conhost.exe (PID: 772 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 1264 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpDC18.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 3732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • MSBuild.exe (PID: 5888 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0 MD5: 88BBB7610152B48C2B3879473B17857E)
    • conhost.exe (PID: 4900 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6076 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 88BBB7610152B48C2B3879473B17857E)
    • conhost.exe (PID: 5312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 5404 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 88BBB7610152B48C2B3879473B17857E)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "2dd052c5-2546-4017-851f-7f690b3c", "Group": "Default", "Domain1": "185.222.57.171", "Domain2": "", "Port": 4445, "RunOnStartup": "Enable", "RequestElevation": "Enable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.484138546.0000000005490000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xe75:$x1: NanoCore.ClientPluginHost
  • 0xe8f:$x2: IClientNetworkHost
00000002.00000002.484138546.0000000005490000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xe75:$x2: NanoCore.ClientPluginHost
  • 0x1261:$s3: PipeExists
  • 0x1136:$s4: PipeCreated
  • 0xeb0:$s5: IClientLoggingHost
00000002.00000002.484247616.0000000005720000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xf7ad:$x1: NanoCore.ClientPluginHost
  • 0xf7da:$x2: IClientNetworkHost
00000002.00000002.484247616.0000000005720000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xf7ad:$x2: NanoCore.ClientPluginHost
  • 0x10888:$s4: PipeCreated
  • 0xf7c7:$s5: IClientLoggingHost
00000002.00000002.484247616.0000000005720000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    Click to see the 15 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    2.2.MSBuild.exe.3bf9c5e.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0x145e3:$x1: NanoCore.ClientPluginHost
    • 0x2d5a7:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    • 0x14610:$x2: IClientNetworkHost
    • 0x2d5d4:$x2: IClientNetworkHost
    2.2.MSBuild.exe.3bf9c5e.4.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x145e3:$x2: NanoCore.ClientPluginHost
    • 0x2d5a7:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0x156be:$s4: PipeCreated
    • 0x2e682:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    • 0x145fd:$s5: IClientLoggingHost
    • 0x2d5c1:$s5: IClientLoggingHost
    2.2.MSBuild.exe.3bf9c5e.4.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      2.2.MSBuild.exe.3bf9c5e.4.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xddf:$a: NanoCore
      • 0xe38:$a: NanoCore
      • 0xe75:$a: NanoCore
      • 0xeee:$a: NanoCore
      • 0x14599:$a: NanoCore
      • 0x145ae:$a: NanoCore
      • 0x145e3:$a: NanoCore
      • 0x2d55d:$a: NanoCore
      • 0x2d572:$a: NanoCore
      • 0x2d5a7:$a: NanoCore
      • 0xe41:$b: ClientPlugin
      • 0xe7e:$b: ClientPlugin
      • 0x177c:$b: ClientPlugin
      • 0x1789:$b: ClientPlugin
      • 0x14355:$b: ClientPlugin
      • 0x14370:$b: ClientPlugin
      • 0x143a0:$b: ClientPlugin
      • 0x145b7:$b: ClientPlugin
      • 0x145ec:$b: ClientPlugin
      • 0x2d319:$b: ClientPlugin
      • 0x2d334:$b: ClientPlugin
      2.2.MSBuild.exe.3bfea94.5.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xd9ad:$x1: NanoCore.ClientPluginHost
      • 0xd9da:$x2: IClientNetworkHost
      Click to see the 33 entries

      Sigma Overview

      AV Detection:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 1240, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 1240, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Stealing of Sensitive Information:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 1240, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 1240, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 00000002.00000002.482810571.0000000003BF7000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "2dd052c5-2546-4017-851f-7f690b3c", "Group": "Default", "Domain1": "185.222.57.171", "Domain2": "", "Port": 4445, "RunOnStartup": "Enable", "RequestElevation": "Enable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Local\Temp\nsoCA66.tmp\5qzt14dbsxlb2e.dllReversingLabs: Detection: 25%
      Multi AV Scanner detection for submitted fileShow sources
      Source: NAO09009009.exeVirustotal: Detection: 33%Perma Link
      Source: NAO09009009.exeReversingLabs: Detection: 34%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000002.00000002.484247616.0000000005720000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.475482671.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.219500091.0000000000B50000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.482810571.0000000003BF7000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: NAO09009009.exe PID: 5896, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 1240, type: MEMORY
      Source: Yara matchFile source: 2.2.MSBuild.exe.3bf9c5e.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.3bfea94.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NAO09009009.exe.b50000.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.3c030bd.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.5724629.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.5720000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.5720000.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NAO09009009.exe.b50000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.3bfea94.5.raw.unpack, type: UNPACKEDPE
      Machine Learning detection for sampleShow sources
      Source: NAO09009009.exeJoe Sandbox ML: detected
      Source: 2.2.MSBuild.exe.5720000.8.unpackAvira: Label: TR/NanoCore.fadte
      Source: 2.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: NAO09009009.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: NAO09009009.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: indows\MSBuild.pdbpdbild.pdbz source: MSBuild.exe, 00000002.00000002.478510030.0000000002815000.00000004.00000040.sdmp
      Source: Binary string: wntdll.pdbUGP source: NAO09009009.exe, 00000000.00000003.214379860.00000000030D0000.00000004.00000001.sdmp
      Source: Binary string: wntdll.pdb source: NAO09009009.exe, 00000000.00000003.214379860.00000000030D0000.00000004.00000001.sdmp
      Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: MSBuild.exe, 00000002.00000002.478510030.0000000002815000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.pdb source: MSBuild.exe, 00000002.00000002.478510030.0000000002815000.00000004.00000040.sdmp
      Source: Binary string: f:\dd\vsproject\xmake\XMakeCommandLine\objr\i386\MSBuild.pdb source: dhcpmon.exe, dhcpmon.exe.2.dr
      Source: Binary string: mscorrc.pdb source: MSBuild.exe, 00000002.00000002.484083545.0000000005430000.00000002.00000001.sdmp
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_00405C4E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_0040689A FindFirstFileW,FindClose,
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_00402902 FindFirstFileW,

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs:
      Source: Malware configuration extractorURLs: 185.222.57.171
      Source: global trafficTCP traffic: 192.168.2.3:49715 -> 185.222.57.171:4445
      Source: Joe Sandbox ViewIP Address: 185.222.57.171 185.222.57.171
      Source: Joe Sandbox ViewASN Name: ROOTLAYERNETNL ROOTLAYERNETNL
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: dhcpmon.exe, 00000009.00000002.226502855.000000000129C000.00000004.00000020.sdmp, dhcpmon.exe, 0000000B.00000002.239160267.0000000001132000.00000004.00000020.sdmpString found in binary or memory: http://go.microsoft.
      Source: dhcpmon.exe, 00000009.00000002.226502855.000000000129C000.00000004.00000020.sdmp, dhcpmon.exe, 0000000B.00000002.239160267.0000000001132000.00000004.00000020.sdmpString found in binary or memory: http://go.microsoft.LinkId=42127
      Source: NAO09009009.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49689
      Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49688
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49685
      Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
      Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49689 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_004056E3 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
      Source: dhcpmon.exe, 00000009.00000002.226474249.0000000001268000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
      Source: MSBuild.exe, 00000002.00000002.484247616.0000000005720000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000002.00000002.484247616.0000000005720000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.475482671.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.219500091.0000000000B50000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.482810571.0000000003BF7000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: NAO09009009.exe PID: 5896, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 1240, type: MEMORY
      Source: Yara matchFile source: 2.2.MSBuild.exe.3bf9c5e.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.3bfea94.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NAO09009009.exe.b50000.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.3c030bd.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.5724629.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.5720000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.5720000.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NAO09009009.exe.b50000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.3bfea94.5.raw.unpack, type: UNPACKEDPE

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000002.00000002.484138546.0000000005490000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000002.00000002.484247616.0000000005720000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000002.00000002.475482671.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000002.00000002.475482671.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.219500091.0000000000B50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.219500091.0000000000B50000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000002.00000002.482810571.0000000003BF7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: NAO09009009.exe PID: 5896, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: NAO09009009.exe PID: 5896, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: MSBuild.exe PID: 1240, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: MSBuild.exe PID: 1240, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.MSBuild.exe.3bf9c5e.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.MSBuild.exe.3bf9c5e.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.MSBuild.exe.3bfea94.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.NAO09009009.exe.b50000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.NAO09009009.exe.b50000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.MSBuild.exe.2bc1718.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.MSBuild.exe.3c030bd.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.MSBuild.exe.5724629.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.MSBuild.exe.5720000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.MSBuild.exe.5720000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.MSBuild.exe.5490000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.NAO09009009.exe.b50000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.NAO09009009.exe.b50000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.MSBuild.exe.3bfea94.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_028416DA NtQuerySystemInformation,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_0284169F NtQuerySystemInformation,
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_004035D8 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_00406C5B
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_00962477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_00977ABE
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_00F23850
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_00F289D8
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_00F2B3C0
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_00F223A0
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_00F22FA8
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_00F2306F
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_00F295D8
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_00F2969F
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 7_2_048D0708
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_00B2692F
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_00B26950
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_00B26D08
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_02D70708
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_009E6950
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_009E6D08
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_009E692F
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_02C50708
      Source: NAO09009009.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: NAO09009009.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: dhcpmon.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: dhcpmon.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: dhcpmon.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: NAO09009009.exe, 00000000.00000003.210865699.000000000333F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs NAO09009009.exe
      Source: NAO09009009.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: 00000002.00000002.484138546.0000000005490000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000002.00000002.484138546.0000000005490000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000002.00000002.484247616.0000000005720000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000002.00000002.484247616.0000000005720000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000002.00000002.475482671.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000002.00000002.475482671.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.219500091.0000000000B50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.219500091.0000000000B50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000002.219500091.0000000000B50000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000002.00000002.482810571.0000000003BF7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: NAO09009009.exe PID: 5896, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: NAO09009009.exe PID: 5896, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: MSBuild.exe PID: 1240, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: MSBuild.exe PID: 1240, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.MSBuild.exe.3bf9c5e.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.MSBuild.exe.3bf9c5e.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 2.2.MSBuild.exe.3bf9c5e.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.MSBuild.exe.3bfea94.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.MSBuild.exe.3bfea94.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.NAO09009009.exe.b50000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.NAO09009009.exe.b50000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.NAO09009009.exe.b50000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.MSBuild.exe.2bc1718.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.MSBuild.exe.2bc1718.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 2.2.MSBuild.exe.3c030bd.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.MSBuild.exe.3c030bd.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 2.2.MSBuild.exe.5724629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.MSBuild.exe.5724629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 2.2.MSBuild.exe.5720000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.MSBuild.exe.5720000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 2.2.MSBuild.exe.5720000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.MSBuild.exe.5720000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 2.2.MSBuild.exe.5490000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.MSBuild.exe.5490000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.NAO09009009.exe.b50000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.NAO09009009.exe.b50000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.NAO09009009.exe.b50000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.MSBuild.exe.3bfea94.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.MSBuild.exe.3bfea94.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 2.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 2.2.MSBuild.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 2.2.MSBuild.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: dhcpmon.exe, 0000000B.00000002.241566186.0000000003191000.00000004.00000001.sdmpBinary or memory string: kr*)C:\Program Files (x86)\DHCP Monitor\*.sln
      Source: MSBuild.exe, 00000002.00000003.216331679.0000000000BF8000.00000004.00000001.sdmp, dhcpmon.exe, 00000009.00000000.223096222.0000000000B22000.00000002.00020000.sdmp, dhcpmon.exe, 0000000B.00000002.237877590.00000000009E2000.00000002.00020000.sdmp, dhcpmon.exe.2.drBinary or memory string: MSBuild MyApp.sln /t:Rebuild /p:Configuration=Release
      Source: MSBuild.exe, 00000002.00000003.216331679.0000000000BF8000.00000004.00000001.sdmp, dhcpmon.exe, 00000009.00000000.223096222.0000000000B22000.00000002.00020000.sdmp, dhcpmon.exe, 0000000B.00000002.237877590.00000000009E2000.00000002.00020000.sdmp, dhcpmon.exe.2.drBinary or memory string: MSBuild MyApp.csproj /t:Clean /p:Configuration=Debug
      Source: MSBuild.exe, 00000002.00000003.216331679.0000000000BF8000.00000004.00000001.sdmp, dhcpmon.exe, 00000009.00000000.223096222.0000000000B22000.00000002.00020000.sdmp, dhcpmon.exe, 0000000B.00000002.237877590.00000000009E2000.00000002.00020000.sdmp, dhcpmon.exe.2.drBinary or memory string: *.sln+AmbiguousProjectError'MissingProjectError)ProjectNotFoundError)InvalidPropertyError
      Source: dhcpmon.exeBinary or memory string: *.sln
      Source: classification engineClassification label: mal100.troj.evad.winEXE@15/14@0/1
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_004035D8 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_0284149A AdjustTokenPrivileges,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_02841463 AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_00404983 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_004021A2 CoCreateInstance,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9AJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3732:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4900:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:772:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{2dd052c5-2546-4017-851f-7f690b3c80bf}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5312:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:968:120:WilError_01
      Source: C:\Users\user\Desktop\NAO09009009.exeFile created: C:\Users\user\AppData\Local\Temp\nsjC9F7.tmpJump to behavior
      Source: NAO09009009.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\Desktop\NAO09009009.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\NAO09009009.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: NAO09009009.exeVirustotal: Detection: 33%
      Source: NAO09009009.exeReversingLabs: Detection: 34%
      Source: C:\Users\user\Desktop\NAO09009009.exeFile read: C:\Users\user\Desktop\NAO09009009.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\NAO09009009.exe 'C:\Users\user\Desktop\NAO09009009.exe'
      Source: C:\Users\user\Desktop\NAO09009009.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 'C:\Users\user\Desktop\NAO09009009.exe'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD89D.tmp'
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpDC18.tmp'
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\NAO09009009.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 'C:\Users\user\Desktop\NAO09009009.exe'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD89D.tmp'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpDC18.tmp'
      Source: C:\Users\user\Desktop\NAO09009009.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: NAO09009009.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: indows\MSBuild.pdbpdbild.pdbz source: MSBuild.exe, 00000002.00000002.478510030.0000000002815000.00000004.00000040.sdmp
      Source: Binary string: wntdll.pdbUGP source: NAO09009009.exe, 00000000.00000003.214379860.00000000030D0000.00000004.00000001.sdmp
      Source: Binary string: wntdll.pdb source: NAO09009009.exe, 00000000.00000003.214379860.00000000030D0000.00000004.00000001.sdmp
      Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: MSBuild.exe, 00000002.00000002.478510030.0000000002815000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.pdb source: MSBuild.exe, 00000002.00000002.478510030.0000000002815000.00000004.00000040.sdmp
      Source: Binary string: f:\dd\vsproject\xmake\XMakeCommandLine\objr\i386\MSBuild.pdb source: dhcpmon.exe, dhcpmon.exe.2.dr
      Source: Binary string: mscorrc.pdb source: MSBuild.exe, 00000002.00000002.484083545.0000000005430000.00000002.00000001.sdmp

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: 2.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 2.2.MSBuild.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_009774B8 push ebp; ret
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_009774AC push ecx; ret
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_0097ABD8 push cs; retf
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_00979D74 push eax; retf
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_0097AAF0 push cs; retf
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_00979D78 pushad ; retf
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_0097AB64 push cs; retf
      Source: 2.2.MSBuild.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 2.2.MSBuild.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\NAO09009009.exeFile created: C:\Users\user\AppData\Local\Temp\nsoCA66.tmp\5qzt14dbsxlb2e.dllJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD89D.tmp'

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\NAO09009009.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NAO09009009.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: threadDelayed 352
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: foregroundWindowGot 967
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1396Thread sleep time: -1844674407370954s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 2172Thread sleep time: -120000s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 996Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5928Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3732Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_00405C4E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_0040689A FindFirstFileW,FindClose,
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_00402902 FindFirstFileW,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_028411C2 GetSystemInfo,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: MSBuild.exe, 00000002.00000002.484609991.0000000006110000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: MSBuild.exe, 00000002.00000002.484609991.0000000006110000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: MSBuild.exe, 00000002.00000002.484609991.0000000006110000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: MSBuild.exe, 00000002.00000002.477430879.0000000000C1F000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: MSBuild.exe, 00000002.00000002.484609991.0000000006110000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_10001000 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_10001110 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_00B43B21 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_00B4385C mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess token adjusted: Debug
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Maps a DLL or memory area into another processShow sources
      Source: C:\Users\user\Desktop\NAO09009009.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe protection: execute and read and write
      Writes to foreign memory regionsShow sources
      Source: C:\Users\user\Desktop\NAO09009009.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 6DB008
      Source: C:\Users\user\Desktop\NAO09009009.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 'C:\Users\user\Desktop\NAO09009009.exe'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD89D.tmp'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpDC18.tmp'
      Source: MSBuild.exe, 00000002.00000002.482393455.0000000002E0C000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: MSBuild.exe, 00000002.00000002.478264802.00000000012D0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: MSBuild.exe, 00000002.00000002.478264802.00000000012D0000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: MSBuild.exe, 00000002.00000002.477430879.0000000000C1F000.00000004.00000020.sdmpBinary or memory string: Program Manager (x86)\DHCP Monitor\dhcpmon.exeBuild.exe
      Source: MSBuild.exe, 00000002.00000002.477483077.0000000000C2D000.00000004.00000020.sdmpBinary or memory string: Program Manageruld be made because the target machine actively refused it.
      Source: MSBuild.exe, 00000002.00000002.478264802.00000000012D0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: MSBuild.exe, 00000002.00000002.477243312.0000000000C05000.00000004.00000020.sdmpBinary or memory string: GrProgram ManagerPd
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Users\user\Desktop\NAO09009009.exeCode function: 0_2_004035D8 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000002.00000002.484247616.0000000005720000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.475482671.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.219500091.0000000000B50000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.482810571.0000000003BF7000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: NAO09009009.exe PID: 5896, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 1240, type: MEMORY
      Source: Yara matchFile source: 2.2.MSBuild.exe.3bf9c5e.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.3bfea94.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NAO09009009.exe.b50000.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.3c030bd.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.5724629.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.5720000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.5720000.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NAO09009009.exe.b50000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.3bfea94.5.raw.unpack, type: UNPACKEDPE

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: NAO09009009.exe, 00000000.00000002.219500091.0000000000B50000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: MSBuild.exe, 00000002.00000002.484138546.0000000005490000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: MSBuild.exe, 00000002.00000002.484138546.0000000005490000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000002.00000002.484247616.0000000005720000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.475482671.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.219500091.0000000000B50000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.482810571.0000000003BF7000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: NAO09009009.exe PID: 5896, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 1240, type: MEMORY
      Source: Yara matchFile source: 2.2.MSBuild.exe.3bf9c5e.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.3bfea94.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NAO09009009.exe.b50000.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.3c030bd.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.5724629.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.5720000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.5720000.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NAO09009009.exe.b50000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.MSBuild.exe.3bfea94.5.raw.unpack, type: UNPACKEDPE
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_028428F6 bind,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_028428C3 bind,

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsScheduled Task/Job1Scheduled Task/Job1Access Token Manipulation1Masquerading2Input Capture21Security Software Discovery111Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection212Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection212LSA SecretsFile and Directory Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Information Discovery15VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsHidden Files and Directories1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobObfuscated Files or Information1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing11/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 411952 Sample: NAO09009009.exe Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 47 Found malware configuration 2->47 49 Malicious sample detected (through community Yara rule) 2->49 51 Multi AV Scanner detection for dropped file 2->51 53 7 other signatures 2->53 8 NAO09009009.exe 19 2->8         started        12 dhcpmon.exe 6 2->12         started        14 MSBuild.exe 4 2->14         started        16 dhcpmon.exe 5 2->16         started        process3 file4 43 C:\Users\user\AppData\...\5qzt14dbsxlb2e.dll, PE32 8->43 dropped 59 Writes to foreign memory regions 8->59 61 Maps a DLL or memory area into another process 8->61 18 MSBuild.exe 1 13 8->18         started        23 conhost.exe 12->23         started        25 conhost.exe 14->25         started        signatures5 process6 dnsIp7 45 185.222.57.171, 4445, 49715, 49718 ROOTLAYERNETNL Netherlands 18->45 37 C:\Users\user\AppData\Roaming\...\run.dat, data 18->37 dropped 39 C:\Users\user\AppData\Local\...\tmpD89D.tmp, XML 18->39 dropped 41 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->41 dropped 55 Uses schtasks.exe or at.exe to add and modify task schedules 18->55 57 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->57 27 schtasks.exe 1 18->27         started        29 schtasks.exe 1 18->29         started        file8 signatures9 process10 process11 31 conhost.exe 27->31         started        33 conhost.exe 27->33         started        35 conhost.exe 29->35         started       

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      NAO09009009.exe33%VirustotalBrowse
      NAO09009009.exe34%ReversingLabsWin32.Backdoor.NanoBot
      NAO09009009.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nsoCA66.tmp\5qzt14dbsxlb2e.dll26%ReversingLabsWin32.Trojan.Jaik

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      2.2.MSBuild.exe.5720000.8.unpack100%AviraTR/NanoCore.fadteDownload File
      2.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      0%Avira URL Cloudsafe
      185.222.57.1715%VirustotalBrowse
      185.222.57.1710%Avira URL Cloudsafe
      http://go.microsoft.0%URL Reputationsafe
      http://go.microsoft.0%URL Reputationsafe
      http://go.microsoft.0%URL Reputationsafe
      http://go.microsoft.0%URL Reputationsafe
      http://go.microsoft.LinkId=421270%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      No contacted domains info

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      true
      • Avira URL Cloud: safe
      low
      185.222.57.171true
      • 5%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://go.microsoft.dhcpmon.exe, 00000009.00000002.226502855.000000000129C000.00000004.00000020.sdmp, dhcpmon.exe, 0000000B.00000002.239160267.0000000001132000.00000004.00000020.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://nsis.sf.net/NSIS_ErrorErrorNAO09009009.exefalse
        high
        http://go.microsoft.LinkId=42127dhcpmon.exe, 00000009.00000002.226502855.000000000129C000.00000004.00000020.sdmp, dhcpmon.exe, 0000000B.00000002.239160267.0000000001132000.00000004.00000020.sdmpfalse
        • Avira URL Cloud: safe
        low

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        185.222.57.171
        unknownNetherlands
        51447ROOTLAYERNETNLtrue

        General Information

        Joe Sandbox Version:32.0.0 Black Diamond
        Analysis ID:411952
        Start date:12.05.2021
        Start time:09:43:46
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 9m 46s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:NAO09009009.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:33
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@15/14@0/1
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 46.4% (good quality ratio 45.1%)
        • Quality average: 86.2%
        • Quality standard deviation: 23.2%
        HCA Information:
        • Successful, ratio: 89%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
        • TCP Packets have been reduced to 100
        • Excluded IPs from analysis (whitelisted): 104.42.151.234, 52.147.198.201, 104.43.193.48, 20.82.209.183, 184.30.20.56, 92.122.213.194, 92.122.213.247, 2.20.142.209, 2.20.142.210, 2.20.143.131, 2.20.143.23, 20.54.26.129, 20.50.102.62
        • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, arc.msn.com, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus16.cloudapp.net, au-bg-shim.trafficmanager.net
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        09:44:42AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        09:44:43API Interceptor978x Sleep call for process: MSBuild.exe modified
        09:44:44Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe" s>$(Arg0)
        09:44:44Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        185.222.57.171SYT09009.exeGet hashmaliciousBrowse
          EyOVPbKPk5.exeGet hashmaliciousBrowse
            AS90800009000000.exeGet hashmaliciousBrowse
              090090000000.exeGet hashmaliciousBrowse
                fatura 893454.pdf.exeGet hashmaliciousBrowse
                  0997430988.exeGet hashmaliciousBrowse

                    Domains

                    No context

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    ROOTLAYERNETNLSYT09009.exeGet hashmaliciousBrowse
                    • 185.222.57.171
                    shipment documents.jarGet hashmaliciousBrowse
                    • 185.222.58.147
                    EyOVPbKPk5.exeGet hashmaliciousBrowse
                    • 185.222.57.171
                    F14 PO pdf.jarGet hashmaliciousBrowse
                    • 185.222.58.147
                    AS90800009000000.exeGet hashmaliciousBrowse
                    • 185.222.57.171
                    FATOUOO000.exeGet hashmaliciousBrowse
                    • 185.222.58.152
                    Statement of Account April-2021.exeGet hashmaliciousBrowse
                    • 45.137.22.107
                    90800000900.exeGet hashmaliciousBrowse
                    • 45.137.22.107
                    fixxing.exeGet hashmaliciousBrowse
                    • 45.137.22.50
                    note-mxm.exeGet hashmaliciousBrowse
                    • 45.137.22.50
                    purchase order confirmation.exeGet hashmaliciousBrowse
                    • 45.137.22.50
                    purchase order acknowledgement.exeGet hashmaliciousBrowse
                    • 45.137.22.50
                    TBBurmah Trading Co., Ltd - products inquiry .exeGet hashmaliciousBrowse
                    • 45.137.22.50
                    FRIEGHT PAYMENT 41,634.20 USD..exeGet hashmaliciousBrowse
                    • 45.137.22.107
                    Due Invoices.exeGet hashmaliciousBrowse
                    • 45.137.22.107
                    PURCHASE ORDER - #0022223 DATED 29042021.exeGet hashmaliciousBrowse
                    • 45.137.22.50
                    PURCHASE ORDER - #0022223, date29042021.exeGet hashmaliciousBrowse
                    • 45.137.22.50
                    B_N SAO SWIFT MT103.exeGet hashmaliciousBrowse
                    • 45.137.22.50
                    PO0900009.exeGet hashmaliciousBrowse
                    • 185.222.58.152
                    PURCHASE ORDER - #0022223 DATED 28042021.exeGet hashmaliciousBrowse
                    • 45.137.22.50

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSYT09009.exeGet hashmaliciousBrowse
                      RFQEMFA.Elektrik.exeGet hashmaliciousBrowse
                        cotizaci#U00f3n.PDF.exeGet hashmaliciousBrowse
                          MT103 Slip.exeGet hashmaliciousBrowse
                            Bank details.exeGet hashmaliciousBrowse
                              Shandong CIRS Form.exeGet hashmaliciousBrowse
                                Placement approval.exeGet hashmaliciousBrowse
                                  filespdf.exeGet hashmaliciousBrowse
                                    goood.exeGet hashmaliciousBrowse
                                      Orden n.#U00ba STL21119, pdf.exeGet hashmaliciousBrowse
                                        Orden n.#U00ba 21115, pdf.exeGet hashmaliciousBrowse
                                          PO-WJO-001, pdf.exeGet hashmaliciousBrowse
                                            DFR2154747.vbeGet hashmaliciousBrowse
                                              SOA Dec2020.exeGet hashmaliciousBrowse
                                                SecuriteInfo.com.Variant.Mikey.117100.12986.exeGet hashmaliciousBrowse
                                                  SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeGet hashmaliciousBrowse
                                                    Purchase Order PDF pdf.exeGet hashmaliciousBrowse
                                                      Orden CW62125Q, pdf.exeGet hashmaliciousBrowse
                                                        7444478441.jsGet hashmaliciousBrowse
                                                          7444478441.jsGet hashmaliciousBrowse

                                                            Created / dropped Files

                                                            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                            File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):69632
                                                            Entropy (8bit):5.20894581699571
                                                            Encrypted:false
                                                            SSDEEP:768:NElGiBcBuiyFjUwF0wdP9/rJMDnRFRJfStGpwV3e3qtAcy:ilGBu7jjP9/tMDn9Jt+VO3GO
                                                            MD5:88BBB7610152B48C2B3879473B17857E
                                                            SHA1:0F6CF8DD66AA58CE31DA4E8AC0631600EF055636
                                                            SHA-256:2C7ACC16D19D076D67E9F1F37984935899B79536C9AC6EEC8850C44D20F87616
                                                            SHA-512:5BACDF6C190A76C2C6A9A3519936E08E898AC8A2B1384D60429DF850BE778860435BF9E5EB316517D2345A5AAE201F369863F7A242134253978BCB5B2179CA58
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Joe Sandbox View:
                                                            • Filename: SYT09009.exe, Detection: malicious, Browse
                                                            • Filename: RFQEMFA.Elektrik.exe, Detection: malicious, Browse
                                                            • Filename: cotizaci#U00f3n.PDF.exe, Detection: malicious, Browse
                                                            • Filename: MT103 Slip.exe, Detection: malicious, Browse
                                                            • Filename: Bank details.exe, Detection: malicious, Browse
                                                            • Filename: Shandong CIRS Form.exe, Detection: malicious, Browse
                                                            • Filename: Placement approval.exe, Detection: malicious, Browse
                                                            • Filename: filespdf.exe, Detection: malicious, Browse
                                                            • Filename: goood.exe, Detection: malicious, Browse
                                                            • Filename: Orden n.#U00ba STL21119, pdf.exe, Detection: malicious, Browse
                                                            • Filename: Orden n.#U00ba 21115, pdf.exe, Detection: malicious, Browse
                                                            • Filename: PO-WJO-001, pdf.exe, Detection: malicious, Browse
                                                            • Filename: DFR2154747.vbe, Detection: malicious, Browse
                                                            • Filename: SOA Dec2020.exe, Detection: malicious, Browse
                                                            • Filename: SecuriteInfo.com.Variant.Mikey.117100.12986.exe, Detection: malicious, Browse
                                                            • Filename: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe, Detection: malicious, Browse
                                                            • Filename: Purchase Order PDF pdf.exe, Detection: malicious, Browse
                                                            • Filename: Orden CW62125Q, pdf.exe, Detection: malicious, Browse
                                                            • Filename: 7444478441.js, Detection: malicious, Browse
                                                            • Filename: 7444478441.js, Detection: malicious, Browse
                                                            Reputation:moderate, very likely benign file
                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....{Z.....................@........... ........@.. .......................@......99....@.....................................S.......`/................... ....................................................... ............... ..H............text....... ...................... ..`.rsrc...`/.......0..................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\MSBuild.exe.log
                                                            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:modified
                                                            Size (bytes):325
                                                            Entropy (8bit):5.334380084018418
                                                            Encrypted:false
                                                            SSDEEP:6:Q3LadLCR22IAQykdL1tZbLsbFLIP12MUAvvro6ysGMFLIP12MUAvvrs:Q3LaJU20NaL1tZbgbe4MqJsGMe4M6
                                                            MD5:65CE98936A67552310EFE2F0FF5BDF88
                                                            SHA1:8133653A6B9A169C7496ADE315CED322CFC3613A
                                                            SHA-256:682F7C55B1B6E189D17755F74959CD08762F91373203B3B982ACFFCADE2E871A
                                                            SHA-512:2D00AC024267EC384720A400F6D0B4F7EDDF49FAF8AB3C9E6CBFBBAE90ECADACA9022B33E3E8EC92E4F57C7FC830299C8643235EB4AA7D8A6AFE9DD1775F57C3
                                                            Malicious:false
                                                            Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..2,"Microsoft.Build.Engine, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build.Framework, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:modified
                                                            Size (bytes):441
                                                            Entropy (8bit):5.388715099859351
                                                            Encrypted:false
                                                            SSDEEP:12:Q3LaJU20NaL10U2+gYhD5itZbgbe4MqJsGMe4M6:MLF20NaL32+g2OH4xvn4j
                                                            MD5:88F0104DB9A3F9BC4F0FC3805F571B0D
                                                            SHA1:CDD4F34385792F0CCE0A844F4ABB447C25AB4E73
                                                            SHA-256:F6C11D3D078ED73F2640DA510E68DEEAA5F14F79CAE2E23A254B4E37C7D0230F
                                                            SHA-512:04B977F63CAB8DE20EA7EFA9D4299C2E625D92FA6D54CA03EECD9F322E978326B353824F23BEC0E712083BDE0DBC5CC4EE90922137106B096050CA46A166DF0E
                                                            Malicious:false
                                                            Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\527c933194f3a99a816d83c619a3e1d3\System.Xml.ni.dll",0..2,"Microsoft.Build.Engine, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build.Framework, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                            C:\Users\user\AppData\Local\Temp\nsdCA26.tmp
                                                            Process:C:\Users\user\Desktop\NAO09009009.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):232699
                                                            Entropy (8bit):7.9458235958445975
                                                            Encrypted:false
                                                            SSDEEP:6144:fYBGR9+zLRHHtBFi+StSPBG/gIT6+ZgfNvUrGXFkE8UFUo5:gB3zhtBSesb6CgfNvxkE1t
                                                            MD5:BFBA87CE8CA843AA02E81A2289ECB113
                                                            SHA1:E1E727DA17C004DC2B4A58C9E712677B68339F93
                                                            SHA-256:9C9EF994D63DEC90825F6F3EC91C81284CD9A51B6F1F8EEB542C11AC05E16D05
                                                            SHA-512:6B52BBC1279D3A8DD01536D7B509025A35CF347D846763DC2F394B43288ABD294D8E9A82E7940FBFB8F5D15AB8776773DC9A79F7F8A0B622890E72049BCF509C
                                                            Malicious:false
                                                            Preview: ........,.......................d....... ...................................................................................................................................................................................................................................................G...................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            C:\Users\user\AppData\Local\Temp\nsoCA66.tmp\5qzt14dbsxlb2e.dll
                                                            Process:C:\Users\user\Desktop\NAO09009009.exe
                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):4096
                                                            Entropy (8bit):3.633293990487776
                                                            Encrypted:false
                                                            SSDEEP:48:qV++kltvwuvDujtEzqwUQgMR2u5lNd/Z3Gmh:qkHvjDNmw/8u7Hnh
                                                            MD5:3BFC96F1A112C283B6585A4CE0C7D189
                                                            SHA1:061A77A69DCA69D2A344A908EBF8598921DD5FFA
                                                            SHA-256:1CBF681459CACFDCAFE28399CA2BB190CE556A573436C8A2B205ABAFB62D948E
                                                            SHA-512:1779FE59F5A09408B039B126FCC2E2E273525458D61184FB217E056C97EDC73F541693C01F7C7AA116368294864FD8781642B7611D820456A5113281A58D74D7
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 26%
                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................................PE..L....D.`...........!......................... ...............................@.......................................$..K.... ....................................................................................... ...............................text............................... ..`.rdata....... ......................@..@.data... ....0......................@...........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            C:\Users\user\AppData\Local\Temp\q1do00rflcztdt
                                                            Process:C:\Users\user\Desktop\NAO09009009.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):15877
                                                            Entropy (8bit):7.987428846489735
                                                            Encrypted:false
                                                            SSDEEP:384:qPV4M3TqyXeFbtRGwo/pSnfM6R4uHlZbmUnFoWHouj89n4:qiM3dcf2pSfZR1HnbmyrHouj89n4
                                                            MD5:24BD111E1EDB9B67A16668B909F37B80
                                                            SHA1:6706B953B5D1B4C211A4DDD0926B380776C3CA1A
                                                            SHA-256:5B454CCD88BC78732CE6B6A40FEC0BBBC5FDEE4191F94ABF0B8DAD8AD06DB629
                                                            SHA-512:08F9CAD39D360AC5EE34E4CFA1FEA6DBBE6E2EA87481D69A3643891507E27B94C815917F0A02F24F71BA55C7667771534B69FB008806D832894E01F602B59F23
                                                            Malicious:false
                                                            Preview: I.p....\.%q...9t.sK.z...t...h.........I....p.}J.~...{I.{..'..N.......;.|.R...C....|._Ll.D...?...=..I@......;.e.U.......a.HAa.A.....2."..p9......{.z.H...E...V.}Ff.Ft,.-...?.>C>......r.C.S...J.}.c.BSs.[...*...<..Z.......R.p.F...W.u.p.SpP0X,..3...1..E4...../.i.I...D...u.LUu.U.......6..Z|-......&.n.\...Y.f..z.IZz.Zm8.1.5.#.-O".......G.G...^ ,.w.^Gg._...>..@ ..V........d.J...[...d.wTt.\...'./.%..Q(.......}.M...H...i.`Ii.I...,...*.0h1......r.P...M.#.^.eNn.N.$.%...7..K6......[.K...R....{.JKk.C.'.2...$..B/......x.^...O...x.[Xx.P"..;...9.eM<.......a.a...L...}.t(..hnK....f3.R%.~..z...._.....*......?..CK~n.[{b..../...4..s....f............&..^HyC.Hh}.=..*#8.).......i............=..QMdX.Mmx.:.@)23.....%.W7..K6...g...TQ)....[.........t/q%..IUL....o._........x|-.....r...QP"..;.:.z-.'..[Sf^.Ccz.0..7...,..k....~...J........>..F`aC.`e.5..".@.!.Yx....a............5..YElX.Ee..2.8!.;.&..I................f.C.S..J..r7.l..3...'...<?6..Mmx.
                                                            C:\Users\user\AppData\Local\Temp\tmpD89D.tmp
                                                            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1320
                                                            Entropy (8bit):5.136963558289723
                                                            Encrypted:false
                                                            SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mnc2xtn:cbk4oL600QydbQxIYODOLedq3ZLj
                                                            MD5:AE766004C0D8792953BAFFFE8F6A2E3B
                                                            SHA1:14B12F27543A401E2FE0AF8052E116CAB0032426
                                                            SHA-256:1ABDD9B6A6B84E4BA1AF1282DC84CE276C59BA253F4C4AF05FEA498A4FD99540
                                                            SHA-512:E530DA4A5D4336FC37838D0E93B5EB3804B9C489C71F6954A47FC81A4C655BB72EC493E109CF96E6E3617D7623AC80697AD3BBD5FFC6281BAFC8B34DCA5E6567
                                                            Malicious:true
                                                            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                            C:\Users\user\AppData\Local\Temp\tmpDC18.tmp
                                                            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1310
                                                            Entropy (8bit):5.109425792877704
                                                            Encrypted:false
                                                            SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                            MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                            SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                            SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                            SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                            Malicious:false
                                                            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                            C:\Users\user\AppData\Local\Temp\yw4e566wncbxyt
                                                            Process:C:\Users\user\Desktop\NAO09009009.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):207872
                                                            Entropy (8bit):7.999202585371924
                                                            Encrypted:true
                                                            SSDEEP:6144:2+zLRHHtBFi+StSPBG/gIT6+ZgfNvUrGXFkE8UFUoW:PzhtBSesb6CgfNvxkE1tW
                                                            MD5:858FF867A327D25FA18931791F3B062E
                                                            SHA1:D072503D61F302AAAC6B711E192AF5F02535F568
                                                            SHA-256:32B1B06E77375392D1204FFB933AB8337D10FC11C22C2069633011998372C5A5
                                                            SHA-512:29F162D83DBB46E1BD25BC99C8088DB29C057BAC5435DF80C000957B41B450AC6E3128C3CB57275198465605527D959B51457BC4F29CD4CBB0D9EBECAAFB3228
                                                            Malicious:false
                                                            Preview: C.. .SypS......q.$S./.M...]O..h..|.r..I.S..|...'Y...X..0..... .._i..]....IO.V:q..fz.O.?.jf}...Oa=..+."..e...].C..<....D0.Y..{7....*..{C.Z.&.x.05s...~&.....M.(...r`......^w..d&UV..Zb.M...{*...l..8z.4..#R..R....*..../.{...v.~MF!./...6..K0..K..w..F..R[z.j"?ev8.rZ.5.g&..W6..`.....Dh3...9..5rh.\.mD.f.....h.......6.c3:.P..C......`+.=.A.....}.b.{}..B...d.ny. jX.../..\....=I.. ..9..6..w.p.O.j..evO.R.Gb.S2..W6$......QUi ;..jwG."..*.$..........Q.>.T....T.%]&...]......+`.M.]6T...g....j..L...O;..I..+~..A.M.*1.N...;<......7.......F9[.9.....ok...W......../.?.n......h.@..>..;.O..?.9.@..p[.......*g..S".:......{...fL.....#..Z..`....2L5.:.....o..U0.*.(E,.#..]....Y..z...9C`..'...M......x.....7"....NU.;.)...+w...8.........3..5.5..5(G..v.=.......e...P....gf.....W....=Z..t.7y.k[...-2gu..w....j..!|..A?4...n..... ..XP.c6V|.....:2p.o..<.....Rm.<...0.}q..-}cNh.M......@.._.s;..e.3M#.F....L:_.+(....V!.hSt.....t..X<<......T._/.......4k.Sd.BS"..B(..u..2.S.
                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):8
                                                            Entropy (8bit):3.0
                                                            Encrypted:false
                                                            SSDEEP:3:Eq:R
                                                            MD5:B7F8B97632E6216C1F0F73EA5DD90CC1
                                                            SHA1:BDE7507A816875E5FD1BF7FE63870814AE874231
                                                            SHA-256:D7BD87BDD316B1C3E51C0A384C58836AFB9553F95343E3A47974229F55C02DD2
                                                            SHA-512:3ADB9F12EEEC3918FB2D0F12791ECFEFF8BE85628C81B2728EB2348A01AD6FF44B897E29C8CDBADB28FF0E53E49253491570560E03557CF2AECB0FA37C7D4ED7
                                                            Malicious:true
                                                            Preview: 2i.=e..H
                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):57
                                                            Entropy (8bit):4.85263908467479
                                                            Encrypted:false
                                                            SSDEEP:3:oMty8WbSI1u:oMLWuI1u
                                                            MD5:A35128E4E28B27328F70E4E8FF482443
                                                            SHA1:B89066B2F8DB34299AABFD7ABEE402D5444DD079
                                                            SHA-256:88AEA00733DC4B570A29D56A423CC5BF163E5ACE7AF349972EB0BBA8D9AD06E1
                                                            SHA-512:F098E844B5373B34642B49B6E0F2E15CFDAA1A8B6CABC2196CEC0F3765289E5B1FD4AB588DD65F97C8E51FA9A81077621E9A06946859F296904C646906A70F33
                                                            Malicious:false
                                                            Preview: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                            \Device\ConDrv
                                                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):306
                                                            Entropy (8bit):4.969261552825097
                                                            Encrypted:false
                                                            SSDEEP:6:zx3M1tlAX8bSWR30qysGMQbSVRRZBXVRbJ0fFdCsq2UTiMdH8stCal+n:zK1XnV30ZsGMIG9BFRbQdCT2UftCM+
                                                            MD5:F227448515085A647910907084E6728E
                                                            SHA1:5FA1A8E28B084DA25A1BBC51A2D75810CEF57E2C
                                                            SHA-256:662BA47D628FE8EBE95DD47B4482110A10B49AED09387BC0E028BB66E68E20BD
                                                            SHA-512:6F6E5DFFF7B17C304FB19B0BA5466AF84EF98A5C2EFA573AF72CFD3ED6964E9FD7F8E4B79FCFFBEF87CE545418C69D4984F4DD60BBF457D0A3640950F8FC5AF0
                                                            Malicious:false
                                                            Preview: Microsoft (R) Build Engine Version 2.0.50727.8922..[Microsoft .NET Framework, Version 2.0.50727.8922]..Copyright (C) Microsoft Corporation 2005. All rights reserved.....MSBUILD : error MSB1003: Specify a project or solution file. The current working directory does not contain a project or solution file...

                                                            Static File Info

                                                            General

                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                            Entropy (8bit):7.827750389453101
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            • DOS Executable Generic (2002/1) 0.02%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:NAO09009009.exe
                                                            File size:283759
                                                            MD5:592b395d837e34b3770d6113b213b877
                                                            SHA1:26498da5dfa58609b38a6f0d294d35e60608cb78
                                                            SHA256:e362816d729cd17eeca2ca5361937558f0455463bf4fba74d220163c43f46308
                                                            SHA512:8545fa49f2c7a11bc619e79bf782ae85183a0430b1a79d742a2a66f9e4d39768aca5eab66d56d1c3414200edc4e5806d01a5bfc3e23a2e351986a5add9afc7f0
                                                            SSDEEP:6144:jgORakB1sWrqD1jMeImmPaEBcrdNvBVcI15AArbVKWJua:jgI1sWrqRnIhiEOdVLnA+JH
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....$_.................f...*.....

                                                            File Icon

                                                            Icon Hash:e4e6b292a4b4bcb4

                                                            Static PE Info

                                                            General

                                                            Entrypoint:0x4035d8
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                            Time Stamp:0x5F24D702 [Sat Aug 1 02:44:18 2020 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:c05041e01f84e1ccca9c4451f3b6a383

                                                            Entrypoint Preview

                                                            Instruction
                                                            sub esp, 000002D4h
                                                            push ebx
                                                            push esi
                                                            push edi
                                                            push 00000020h
                                                            pop edi
                                                            xor ebx, ebx
                                                            push 00008001h
                                                            mov dword ptr [esp+14h], ebx
                                                            mov dword ptr [esp+10h], 0040A230h
                                                            mov dword ptr [esp+1Ch], ebx
                                                            call dword ptr [004080C8h]
                                                            call dword ptr [004080CCh]
                                                            and eax, BFFFFFFFh
                                                            cmp ax, 00000006h
                                                            mov dword ptr [0042A26Ch], eax
                                                            je 00007F4D4493F713h
                                                            push ebx
                                                            call 00007F4D44942A19h
                                                            cmp eax, ebx
                                                            je 00007F4D4493F709h
                                                            push 00000C00h
                                                            call eax
                                                            mov esi, 004082B0h
                                                            push esi
                                                            call 00007F4D44942993h
                                                            push esi
                                                            call dword ptr [00408154h]
                                                            lea esi, dword ptr [esi+eax+01h]
                                                            cmp byte ptr [esi], 00000000h
                                                            jne 00007F4D4493F6ECh
                                                            push 0000000Bh
                                                            call 00007F4D449429ECh
                                                            push 00000009h
                                                            call 00007F4D449429E5h
                                                            push 00000007h
                                                            mov dword ptr [0042A264h], eax
                                                            call 00007F4D449429D9h
                                                            cmp eax, ebx
                                                            je 00007F4D4493F711h
                                                            push 0000001Eh
                                                            call eax
                                                            test eax, eax
                                                            je 00007F4D4493F709h
                                                            or byte ptr [0042A26Fh], 00000040h
                                                            push ebp
                                                            call dword ptr [00408038h]
                                                            push ebx
                                                            call dword ptr [00408298h]
                                                            mov dword ptr [0042A338h], eax
                                                            push ebx
                                                            lea eax, dword ptr [esp+34h]
                                                            push 000002B4h
                                                            push eax
                                                            push ebx
                                                            push 00421708h
                                                            call dword ptr [0040818Ch]
                                                            push 0040A384h

                                                            Rich Headers

                                                            Programming Language:
                                                            • [EXP] VC++ 6.0 SP5 build 8804

                                                            Data Directories

                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b0000x6010.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                            Sections

                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x65720x6600False0.662300857843data6.45391938596IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                            .rdata0x80000x13980x1400False0.449609375data5.13671758274IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0xa0000x203780x600False0.5078125data4.09680908363IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                            .ndata0x2b0000x100000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .rsrc0x3b0000x60100x6200False0.451769770408data5.54913124873IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                            Resources

                                                            NameRVASizeTypeLanguageCountry
                                                            RT_ICON0x3b2800x25a8dataEnglishUnited States
                                                            RT_ICON0x3d8280x10a8dataEnglishUnited States
                                                            RT_ICON0x3e8d00xea8dataEnglishUnited States
                                                            RT_ICON0x3f7780x8a8dataEnglishUnited States
                                                            RT_ICON0x400200x568GLS_BINARY_LSB_FIRSTEnglishUnited States
                                                            RT_ICON0x405880x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                                            RT_DIALOG0x409f00x100dataEnglishUnited States
                                                            RT_DIALOG0x40af00x11cdataEnglishUnited States
                                                            RT_DIALOG0x40c100x60dataEnglishUnited States
                                                            RT_GROUP_ICON0x40c700x5adataEnglishUnited States
                                                            RT_MANIFEST0x40cd00x340XML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

                                                            Imports

                                                            DLLImport
                                                            ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                                            SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                                            ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                                            COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                                            USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, SetWindowPos, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                                            GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                                            KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersion, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, ExitProcess, CopyFileW, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW

                                                            Possible Origin

                                                            Language of compilation systemCountry where language is spokenMap
                                                            EnglishUnited States

                                                            Network Behavior

                                                            Network Port Distribution

                                                            TCP Packets

                                                            TimestampSource PortDest PortSource IPDest IP
                                                            May 12, 2021 09:44:29.477237940 CEST49698443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.491261959 CEST49699443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.512136936 CEST49701443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.534522057 CEST4434969892.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.534720898 CEST4434969892.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.534754038 CEST4434969892.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.534852028 CEST49698443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.534882069 CEST49698443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.536649942 CEST4434969892.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.536694050 CEST4434969892.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.536758900 CEST49698443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.536789894 CEST49698443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.538896084 CEST4434969892.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.538988113 CEST49698443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.545105934 CEST49700443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.547403097 CEST4434969992.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.547899008 CEST4434969992.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.547925949 CEST4434969992.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.547950029 CEST4434969992.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.547965050 CEST4434969992.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.547986031 CEST49699443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.548022032 CEST49699443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.567554951 CEST4434970192.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.568203926 CEST49689443192.168.2.3131.253.33.200
                                                            May 12, 2021 09:44:29.568361044 CEST49689443192.168.2.3131.253.33.200
                                                            May 12, 2021 09:44:29.570080042 CEST4434970192.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.570108891 CEST4434970192.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.570125103 CEST4434970192.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.570157051 CEST4434970192.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.570173025 CEST4434970192.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.570183039 CEST49701443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.570266008 CEST49701443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.590218067 CEST49699443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.600667953 CEST4434970092.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.600966930 CEST4434970092.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.600995064 CEST4434970092.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.601016045 CEST4434970092.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.601038933 CEST4434970092.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.601058960 CEST4434970092.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.601058960 CEST49700443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.601082087 CEST4434970092.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.601098061 CEST4434970092.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.601124048 CEST49700443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.601171017 CEST49700443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.613279104 CEST49700443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.615782976 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.615816116 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.615827084 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.615837097 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.615852118 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.615869045 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.615885973 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.615902901 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.615919113 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.615932941 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.616024017 CEST49689443192.168.2.3131.253.33.200
                                                            May 12, 2021 09:44:29.616106987 CEST49689443192.168.2.3131.253.33.200
                                                            May 12, 2021 09:44:29.645822048 CEST4434969992.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.646908998 CEST4434969992.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.646943092 CEST4434969992.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.647018909 CEST49699443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.647061110 CEST49699443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.648627996 CEST4434969992.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.648711920 CEST49699443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.663728952 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.663768053 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.663794994 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.663820028 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.663855076 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.663887024 CEST49689443192.168.2.3131.253.33.200
                                                            May 12, 2021 09:44:29.663935900 CEST49689443192.168.2.3131.253.33.200
                                                            May 12, 2021 09:44:29.663965940 CEST49689443192.168.2.3131.253.33.200
                                                            May 12, 2021 09:44:29.664012909 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.664040089 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.664067984 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.664093971 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.664127111 CEST49689443192.168.2.3131.253.33.200
                                                            May 12, 2021 09:44:29.664164066 CEST49689443192.168.2.3131.253.33.200
                                                            May 12, 2021 09:44:29.664176941 CEST49689443192.168.2.3131.253.33.200
                                                            May 12, 2021 09:44:29.664187908 CEST49689443192.168.2.3131.253.33.200
                                                            May 12, 2021 09:44:29.664223909 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.664247990 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.664284945 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.664309025 CEST49689443192.168.2.3131.253.33.200
                                                            May 12, 2021 09:44:29.664351940 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.669001102 CEST4434970092.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.670507908 CEST49689443192.168.2.3131.253.33.200
                                                            May 12, 2021 09:44:29.670558929 CEST49689443192.168.2.3131.253.33.200
                                                            May 12, 2021 09:44:29.681108952 CEST4434970092.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.681159973 CEST4434970092.122.145.220192.168.2.3
                                                            May 12, 2021 09:44:29.681308031 CEST49700443192.168.2.392.122.145.220
                                                            May 12, 2021 09:44:29.712960005 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.713013887 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.713059902 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.713099003 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.713135958 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.713172913 CEST44349689131.253.33.200192.168.2.3
                                                            May 12, 2021 09:44:29.713238955 CEST49689443192.168.2.3131.253.33.200
                                                            May 12, 2021 09:44:29.713263988 CEST49689443192.168.2.3131.253.33.200
                                                            May 12, 2021 09:44:29.718096018 CEST44349689131.253.33.200192.168.2.3

                                                            UDP Packets

                                                            TimestampSource PortDest PortSource IPDest IP
                                                            May 12, 2021 09:44:28.892548084 CEST6493853192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:28.941346884 CEST53649388.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:30.280045033 CEST6015253192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:30.328808069 CEST53601528.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:33.119975090 CEST5754453192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:33.173728943 CEST53575448.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:34.520463943 CEST5598453192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:34.586055994 CEST53559848.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:35.818169117 CEST6418553192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:35.868401051 CEST53641858.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:37.162779093 CEST6511053192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:37.211580038 CEST53651108.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:38.300517082 CEST5836153192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:38.354060888 CEST53583618.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:42.776598930 CEST6349253192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:42.834000111 CEST53634928.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:43.757005930 CEST6083153192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:43.812577009 CEST53608318.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:44.780057907 CEST6010053192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:44.829046965 CEST53601008.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:47.608786106 CEST5319553192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:47.660283089 CEST53531958.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:49.955550909 CEST5014153192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:50.006314039 CEST53501418.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:51.224637985 CEST5302353192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:51.275702000 CEST53530238.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:52.704076052 CEST4956353192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:52.753058910 CEST53495638.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:53.841758013 CEST5135253192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:53.892168999 CEST53513528.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:56.843431950 CEST5934953192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:56.893704891 CEST53593498.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:57.863147020 CEST5708453192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:57.912159920 CEST53570848.8.8.8192.168.2.3
                                                            May 12, 2021 09:44:59.025852919 CEST5882353192.168.2.38.8.8.8
                                                            May 12, 2021 09:44:59.077375889 CEST53588238.8.8.8192.168.2.3
                                                            May 12, 2021 09:45:03.918459892 CEST5756853192.168.2.38.8.8.8
                                                            May 12, 2021 09:45:03.993010044 CEST53575688.8.8.8192.168.2.3
                                                            May 12, 2021 09:45:04.259522915 CEST5054053192.168.2.38.8.8.8
                                                            May 12, 2021 09:45:04.350425005 CEST53505408.8.8.8192.168.2.3
                                                            May 12, 2021 09:45:19.328228951 CEST5436653192.168.2.38.8.8.8
                                                            May 12, 2021 09:45:19.390644073 CEST53543668.8.8.8192.168.2.3
                                                            May 12, 2021 09:45:24.734114885 CEST5303453192.168.2.38.8.8.8
                                                            May 12, 2021 09:45:24.793651104 CEST53530348.8.8.8192.168.2.3
                                                            May 12, 2021 09:45:37.273210049 CEST5776253192.168.2.38.8.8.8
                                                            May 12, 2021 09:45:37.332145929 CEST53577628.8.8.8192.168.2.3
                                                            May 12, 2021 09:45:42.478077888 CEST5543553192.168.2.38.8.8.8
                                                            May 12, 2021 09:45:42.536917925 CEST53554358.8.8.8192.168.2.3
                                                            May 12, 2021 09:46:14.662676096 CEST5071353192.168.2.38.8.8.8
                                                            May 12, 2021 09:46:14.730705976 CEST53507138.8.8.8192.168.2.3
                                                            May 12, 2021 09:46:16.464292049 CEST5613253192.168.2.38.8.8.8
                                                            May 12, 2021 09:46:16.521667004 CEST53561328.8.8.8192.168.2.3

                                                            Code Manipulations

                                                            Statistics

                                                            Behavior

                                                            Click to jump to process

                                                            System Behavior

                                                            General

                                                            Start time:09:44:37
                                                            Start date:12/05/2021
                                                            Path:C:\Users\user\Desktop\NAO09009009.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:'C:\Users\user\Desktop\NAO09009009.exe'
                                                            Imagebase:0x400000
                                                            File size:283759 bytes
                                                            MD5 hash:592B395D837E34B3770D6113B213B877
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.219500091.0000000000B50000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.219500091.0000000000B50000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.219500091.0000000000B50000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.219500091.0000000000B50000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            Reputation:low

                                                            General

                                                            Start time:09:44:38
                                                            Start date:12/05/2021
                                                            Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:'C:\Users\user\Desktop\NAO09009009.exe'
                                                            Imagebase:0x470000
                                                            File size:69632 bytes
                                                            MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.484138546.0000000005490000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.484138546.0000000005490000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.484247616.0000000005720000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.484247616.0000000005720000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.484247616.0000000005720000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.475482671.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.475482671.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.475482671.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.482810571.0000000003BF7000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.482810571.0000000003BF7000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            Reputation:moderate

                                                            General

                                                            Start time:09:44:42
                                                            Start date:12/05/2021
                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD89D.tmp'
                                                            Imagebase:0x1260000
                                                            File size:185856 bytes
                                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            General

                                                            Start time:09:44:42
                                                            Start date:12/05/2021
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6b2800000
                                                            File size:625664 bytes
                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            General

                                                            Start time:09:44:42
                                                            Start date:12/05/2021
                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpDC18.tmp'
                                                            Imagebase:0x1260000
                                                            File size:185856 bytes
                                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            General

                                                            Start time:09:44:43
                                                            Start date:12/05/2021
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6b2800000
                                                            File size:625664 bytes
                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            General

                                                            Start time:09:44:44
                                                            Start date:12/05/2021
                                                            Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0
                                                            Imagebase:0x110000
                                                            File size:69632 bytes
                                                            MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Reputation:moderate

                                                            General

                                                            Start time:09:44:44
                                                            Start date:12/05/2021
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6b2800000
                                                            File size:625664 bytes
                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            General

                                                            Start time:09:44:44
                                                            Start date:12/05/2021
                                                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                            Imagebase:0xb20000
                                                            File size:69632 bytes
                                                            MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Antivirus matches:
                                                            • Detection: 0%, Metadefender, Browse
                                                            • Detection: 0%, ReversingLabs
                                                            Reputation:moderate

                                                            General

                                                            Start time:09:44:45
                                                            Start date:12/05/2021
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6b2800000
                                                            File size:625664 bytes
                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            General

                                                            Start time:09:44:50
                                                            Start date:12/05/2021
                                                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                            Imagebase:0x9e0000
                                                            File size:69632 bytes
                                                            MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Reputation:moderate

                                                            General

                                                            Start time:09:44:51
                                                            Start date:12/05/2021
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6b2800000
                                                            File size:625664 bytes
                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            Disassembly

                                                            Code Analysis

                                                            Reset < >