Loading ...

Play interactive tourEdit tour

Analysis Report INVOIC #CTR 110510H001347.exe

Overview

General Information

Sample Name:INVOIC #CTR 110510H001347.exe
Analysis ID:412100
MD5:b3c101859298060c18a83b28d0449325
SHA1:a8a4686c8e0d75ed10eefa59b01e3da7215c846f
SHA256:47fcfe4b9687b8ddc8ce16c961d78a9941fa483400898e43cb4b2b8f3863f6d5
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • INVOIC #CTR 110510H001347.exe (PID: 6720 cmdline: 'C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe' MD5: B3C101859298060C18A83B28D0449325)
    • schtasks.exe (PID: 7052 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VwvbEzxTQmiw' /XML 'C:\Users\user\AppData\Local\Temp\tmp105.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7068 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 4552 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: B3C101859298060C18A83B28D0449325)
    • schtasks.exe (PID: 6844 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VwvbEzxTQmiw' /XML 'C:\Users\user\AppData\Local\Temp\tmp774E.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 1256 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: B3C101859298060C18A83B28D0449325)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "faa60493-d519-4c8d-8ff8-8e7cd20e", "Group": "Default", "Domain1": "79.134.225.17", "Domain2": "127.0.0.1", "Port": 2050, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000012.00000002.749734495.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000012.00000002.749734495.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000012.00000002.749734495.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000006.00000002.922515364.0000000005650000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x8ba5:$x1: NanoCore.ClientPluginHost
    • 0x8bd2:$x2: IClientNetworkHost
    00000006.00000002.922515364.0000000005650000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x8ba5:$x2: NanoCore.ClientPluginHost
    • 0x9b74:$s2: FileCommand
    • 0xe576:$s4: PipeCreated
    • 0x8bbf:$s5: IClientLoggingHost
    Click to see the 59 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    6.2.INVOIC #CTR 110510H001347.exe.5690000.18.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x3f0b:$x1: NanoCore.ClientPluginHost
    • 0x3f44:$x2: IClientNetworkHost
    6.2.INVOIC #CTR 110510H001347.exe.5690000.18.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x3f0b:$x2: NanoCore.ClientPluginHost
    • 0x400f:$s4: PipeCreated
    • 0x3f25:$s5: IClientLoggingHost
    6.2.INVOIC #CTR 110510H001347.exe.56c0000.20.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    6.2.INVOIC #CTR 110510H001347.exe.56c0000.20.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    6.2.INVOIC #CTR 110510H001347.exe.62e0000.27.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1deb:$x1: NanoCore.ClientPluginHost
    • 0x1e24:$x2: IClientNetworkHost
    Click to see the 133 entries

    Sigma Overview

    AV Detection:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe, ProcessId: 7112, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe, ProcessId: 7112, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Stealing of Sensitive Information:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe, ProcessId: 7112, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe, ProcessId: 7112, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 00000006.00000002.920330118.0000000003BF1000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "faa60493-d519-4c8d-8ff8-8e7cd20e", "Group": "Default", "Domain1": "79.134.225.17", "Domain2": "127.0.0.1", "Port": 2050, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
    Multi AV Scanner detection for dropped fileShow sources
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 29%
    Source: C:\Users\user\AppData\Roaming\VwvbEzxTQmiw.exeReversingLabs: Detection: 29%
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 00000012.00000002.749734495.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.738973461.0000000003828000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.922946801.0000000005F10000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.917997308.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.920330118.0000000003BF1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000012.00000002.751674147.0000000002911000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000012.00000002.751817230.0000000003919000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.681081392.0000000004137000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1256, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 7112, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 6720, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4552, type: MEMORY
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.3c0cff9.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.5f14629.23.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.5f10000.22.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.2.dhcpmon.exe.38dc850.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.3bf454d.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.395ff24.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.5f10000.22.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.396454d.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.395ff24.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.3c089d0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.3c089d0.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.395b0ee.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.2.dhcpmon.exe.38dc850.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.raw.unpack, type: UNPACKEDPE
    Machine Learning detection for dropped fileShow sources
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Roaming\VwvbEzxTQmiw.exeJoe Sandbox ML: detected
    Machine Learning detection for sampleShow sources
    Source: INVOIC #CTR 110510H001347.exeJoe Sandbox ML: detected
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5f10000.22.unpackAvira: Label: TR/NanoCore.fadte
    Source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 18.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3c089d0.9.unpackAvira: Label: TR/NanoCore.fadte
    Source: INVOIC #CTR 110510H001347.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: INVOIC #CTR 110510H001347.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: System.pdbE source: INVOIC #CTR 110510H001347.exe, 00000006.00000003.911566189.00000000066E9000.00000004.00000001.sdmp
    Source: Binary string: \??\C:\Windows\dll\System.pdb6 source: INVOIC #CTR 110510H001347.exe, 00000006.00000003.911586437.00000000066F9000.00000004.00000001.sdmp
    Source: Binary string: symbols\dll\System.pdb*Z source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.918913855.000000000105C000.00000004.00000001.sdmp
    Source: Binary string: \??\C:\Windows\symbols\dll\System.pdbl source: INVOIC #CTR 110510H001347.exe, 00000006.00000003.911566189.00000000066E9000.00000004.00000001.sdmp
    Source: Binary string: i,C:\Windows\System.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.918913855.000000000105C000.00000004.00000001.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000003.911586437.00000000066F9000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmp
    Source: Binary string: \??\C:\Windows\System.pdb9 source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.923955790.00000000066C2000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmp
    Source: Binary string: \??\C:\Windows\System.pdbt source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.923955790.00000000066C2000.00000004.00000001.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmp
    Source: Binary string: System.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000003.911586437.00000000066F9000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmp
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then push dword ptr [ebp-24h]
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then push dword ptr [ebp-24h]
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then push dword ptr [ebp-20h]
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then push dword ptr [ebp-20h]
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then xor edx, edx
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then xor edx, edx
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h

    Networking:

    barindex
    Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49745 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49747 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49749 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49752 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49754 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49755 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49757 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49766 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49770 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49776 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49777 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49778 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49779 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49780 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49781 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49783 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49785 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49786 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49787 -> 79.134.225.17:2050
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49788 -> 79.134.225.17:2050
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: 79.134.225.17
    Source: Malware configuration extractorURLs: 127.0.0.1
    Source: global trafficTCP traffic: 192.168.2.4:49745 -> 79.134.225.17:2050
    Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.17
    Source: dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: http://checkip.dyndns.org/
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpString found in binary or memory: http://google.com
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.680822597.00000000035F0000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: http://servermanager.miixit.org/1
    Source: dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: http://servermanager.miixit.org/downloads/
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000003.667947872.00000000036A0000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: http://servermanager.miixit.org/hits/hit_index.php?k=
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000003.667947872.00000000036A0000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: http://servermanager.miixit.org/index_ru.html
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000003.667947872.00000000036A0000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: http://servermanager.miixit.org/index_ru.htmlc
    Source: dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: http://servermanager.miixit.org/report/reporter_index.php?name=
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.678988274.0000000003133000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000003.667947872.00000000036A0000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CJU3DBQXBUQPC
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000003.667947872.00000000036A0000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CJU3DBQXBUQPC5http://servermana
    Source: dhcpmon.exe, 00000008.00000002.735148709.0000000000B38000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.922946801.0000000005F10000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud:

    barindex
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 00000012.00000002.749734495.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.738973461.0000000003828000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.922946801.0000000005F10000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.917997308.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.920330118.0000000003BF1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000012.00000002.751674147.0000000002911000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000012.00000002.751817230.0000000003919000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.681081392.0000000004137000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1256, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 7112, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 6720, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4552, type: MEMORY
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.3c0cff9.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.5f14629.23.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.5f10000.22.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.2.dhcpmon.exe.38dc850.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.3bf454d.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.395ff24.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.5f10000.22.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.396454d.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.395ff24.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.3c089d0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.3c089d0.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.395b0ee.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.2.dhcpmon.exe.38dc850.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.raw.unpack, type: UNPACKEDPE

    System Summary:

    barindex
    Malicious sample detected (through community Yara rule)Show sources
    Source: 00000012.00000002.749734495.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000012.00000002.749734495.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.922515364.0000000005650000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.924419002.0000000006AC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000008.00000002.738973461.0000000003828000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000008.00000002.738973461.0000000003828000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.924619659.0000000006B30000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.922946801.0000000005F10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.917997308.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.917997308.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.924483216.0000000006AE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.922665909.00000000056A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.923514818.00000000062D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000012.00000002.751674147.0000000002911000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.924513831.0000000006AF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.922694661.00000000056C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000012.00000002.751817230.0000000003919000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.923487313.00000000062C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.922580530.0000000005680000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.920693142.0000000003E91000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.922431506.0000000005630000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.922598044.0000000005690000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.923603184.00000000062E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.681081392.0000000004137000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.681081392.0000000004137000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: dhcpmon.exe PID: 1256, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: dhcpmon.exe PID: 1256, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 7112, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 7112, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 6720, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 6720, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: dhcpmon.exe PID: 4552, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: dhcpmon.exe PID: 4552, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5690000.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.56c0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.62e0000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.62d0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3c0cff9.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6ac0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3eed147.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.62e0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5f14629.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5f10000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 8.2.dhcpmon.exe.38dc850.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 8.2.dhcpmon.exe.38dc850.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3bf454d.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.56a0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.INVOIC #CTR 110510H001347.exe.62c0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6ac0000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 18.2.dhcpmon.exe.395ff24.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6ae0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5f10000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3eed147.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3eed147.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6b30000.33.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 18.2.dhcpmon.exe.396454d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.2c3243c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.2c3243c.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6af4c9f.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 18.2.dhcpmon.exe.395ff24.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3f043a6.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5690000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3ef5f76.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5650000.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5630000.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6b30000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.2c261f4.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.62d0000.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3ba9930.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3bb81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3f043a6.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3ef5f76.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6af0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6ae0000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.2c3243c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3ba9930.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.56a0000.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5680000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5630000.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3bae5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3c089d0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3c089d0.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5650000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 18.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 18.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 18.2.dhcpmon.exe.2979658.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6afe8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 18.2.dhcpmon.exe.395b0ee.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 18.2.dhcpmon.exe.395b0ee.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6af0000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.2bfef98.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 8.2.dhcpmon.exe.38dc850.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 8.2.dhcpmon.exe.38dc850.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.INVOIC #CTR 110510H001347.exe.2c261f4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.INVOIC #CTR 110510H001347.exe.2c261f4.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    PE file contains section with special charsShow sources
    Source: INVOIC #CTR 110510H001347.exeStatic PE information: section name: >yhX~ gc
    Source: VwvbEzxTQmiw.exe.0.drStatic PE information: section name: >yhX~ gc
    Source: dhcpmon.exe.6.drStatic PE information: section name: >yhX~ gc
    PE file has nameless sectionsShow sources
    Source: INVOIC #CTR 110510H001347.exeStatic PE information: section name:
    Source: VwvbEzxTQmiw.exe.0.drStatic PE information: section name:
    Source: dhcpmon.exe.6.drStatic PE information: section name:
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_017504E8
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_01753880
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_01752650
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_01752E83
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_0175257F
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_01751979
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_0175255B
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_01756D28
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_01756D19
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_017561E0
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_0175A990
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_017568F8
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_017568E8
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_0175B370
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_01753311
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_01756F11
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_01756B00
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_0175A388
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_01756270
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_01756260
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_01756AF0
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_05165ED0
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_051688D0
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_0565F750
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_0565DD48
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_056506E8
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_056506F8
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_05652F08
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_05652F18
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_05658A38
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_0565D3D0
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_0085DC8E
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_0504E471
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_0504E480
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_0504BBD4
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_062F8720
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_062F0040
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_062F7B08
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_062F87DE
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_0715ED62
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_0715B438
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_0715AB68
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_07152BB0
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_071502F0
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_07150F08
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_07150FC6
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_071537C8
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_01013883
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_010104E1
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_01012650
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_01012E79
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_01016D19
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_01016D28
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_0101255B
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_0101197B
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_0101257F
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_0101A990
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_010168F3
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_010168F8
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_01016B00
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_01013311
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_01016F1B
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_0101B370
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_0101A388
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_01016260
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_01016270
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_01016AFB
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_0991BD90
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09919410
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_099182D0
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_0991C6D8
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09918640
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_0991411C
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09916500
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09913C88
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_099158B2
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_099134F1
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_099164F0
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09915810
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09914017
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09919400
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_0991580F
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09919037
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09919038
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_0991003F
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09910040
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09913C79
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_099137F0
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_099137EF
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09919707
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09913F30
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09913F3F
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09913F40
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09914374
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09912EA8
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_099182C0
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09912EF8
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_0991961D
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09919636
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_0991863F
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_005ADC8E
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_0277E471
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_0277E480
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_0277BBD4
    Source: INVOIC #CTR 110510H001347.exeBinary or memory string: OriginalFilename vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.685377817.0000000005680000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dll.muij% vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.680822597.00000000035F0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameIDisposable.exeF vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.680822597.00000000035F0000.00000004.00000001.sdmpBinary or memory string: "l,\\StringFileInfo\\000004B0\\OriginalFilename vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000003.667947872.00000000036A0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll( vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.685742101.000000000A1F0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.685354430.0000000005670000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dllj% vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.685782436.000000000A240000.00000002.00000001.sdmpBinary or memory string: originalfilename vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.685782436.000000000A240000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.681081392.0000000004137000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exeBinary or memory string: OriginalFilename vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.924419002.0000000006AC0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.924619659.0000000006B30000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.922830330.0000000005E20000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.924656572.0000000006B40000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.922946801.0000000005F10000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.922946801.0000000005F10000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.924513831.0000000006AF0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.924513831.0000000006AF0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.924513831.0000000006AF0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exeBinary or memory string: OriginalFilenameIDisposable.exeF vs INVOIC #CTR 110510H001347.exe
    Source: INVOIC #CTR 110510H001347.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: 00000012.00000002.749734495.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000012.00000002.749734495.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.922515364.0000000005650000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.922515364.0000000005650000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.924419002.0000000006AC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.924419002.0000000006AC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000008.00000002.738973461.0000000003828000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000008.00000002.738973461.0000000003828000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.924619659.0000000006B30000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.924619659.0000000006B30000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.922946801.0000000005F10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.922946801.0000000005F10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.917997308.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.917997308.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.924483216.0000000006AE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.924483216.0000000006AE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.922665909.00000000056A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.922665909.00000000056A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.923514818.00000000062D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.923514818.00000000062D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000012.00000002.751674147.0000000002911000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.924513831.0000000006AF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.924513831.0000000006AF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.922694661.00000000056C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.922694661.00000000056C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000012.00000002.751817230.0000000003919000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.923487313.00000000062C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.923487313.00000000062C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.922580530.0000000005680000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.922580530.0000000005680000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.920693142.0000000003E91000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.922431506.0000000005630000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.922431506.0000000005630000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.922598044.0000000005690000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.922598044.0000000005690000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.923603184.00000000062E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.923603184.00000000062E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000000.00000002.681081392.0000000004137000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000000.00000002.681081392.0000000004137000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: dhcpmon.exe PID: 1256, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: dhcpmon.exe PID: 1256, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 7112, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 7112, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 6720, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 6720, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: dhcpmon.exe PID: 4552, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: dhcpmon.exe PID: 4552, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5690000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5690000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.56c0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.56c0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.62e0000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.62e0000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.62d0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.62d0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3c0cff9.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3c0cff9.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6ac0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6ac0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3eed147.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3eed147.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.62e0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.62e0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5f14629.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5f14629.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5f10000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5f10000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 8.2.dhcpmon.exe.38dc850.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 8.2.dhcpmon.exe.38dc850.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 8.2.dhcpmon.exe.38dc850.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3bf454d.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3bf454d.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.56a0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.56a0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.INVOIC #CTR 110510H001347.exe.62c0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.62c0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6ac0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6ac0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 18.2.dhcpmon.exe.395ff24.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 18.2.dhcpmon.exe.395ff24.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6ae0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6ae0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5f10000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5f10000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3eed147.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3eed147.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3eed147.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6b30000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6b30000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 18.2.dhcpmon.exe.396454d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 18.2.dhcpmon.exe.396454d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.2c3243c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.2c3243c.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6af4c9f.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6af4c9f.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 18.2.dhcpmon.exe.395ff24.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 18.2.dhcpmon.exe.395ff24.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3f043a6.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3f043a6.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5690000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5690000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3ef5f76.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3ef5f76.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5650000.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5650000.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5630000.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5630000.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6b30000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6b30000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.2c261f4.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.2c261f4.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.62d0000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.62d0000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3ba9930.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3ba9930.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3bb81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3bb81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3f043a6.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3f043a6.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3ef5f76.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3ef5f76.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6af0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6af0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6ae0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6ae0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.2c3243c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.2c3243c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3ba9930.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3ba9930.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.56a0000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.56a0000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5680000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5680000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5630000.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5630000.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3bae5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3bae5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3c089d0.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3c089d0.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3c089d0.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.3c089d0.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5650000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.5650000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 18.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 18.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 18.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 18.2.dhcpmon.exe.2979658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 18.2.dhcpmon.exe.2979658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6afe8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6afe8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 18.2.dhcpmon.exe.395b0ee.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 18.2.dhcpmon.exe.395b0ee.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 18.2.dhcpmon.exe.395b0ee.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6af0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.6af0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.2bfef98.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 8.2.dhcpmon.exe.38dc850.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 8.2.dhcpmon.exe.38dc850.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.INVOIC #CTR 110510H001347.exe.2c261f4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.INVOIC #CTR 110510H001347.exe.2c261f4.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: INVOIC #CTR 110510H001347.exeStatic PE information: Section: >yhX~ gc ZLIB complexity 1.00031603573
    Source: VwvbEzxTQmiw.exe.0.drStatic PE information: Section: >yhX~ gc ZLIB complexity 1.00031603573
    Source: dhcpmon.exe.6.drStatic PE information: Section: >yhX~ gc ZLIB complexity 1.00031603573
    Source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 18.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 18.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 18.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 18.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 18.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: classification engineClassification label: mal100.troj.evad.winEXE@12/12@0/1
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeFile created: C:\Users\user\AppData\Roaming\VwvbEzxTQmiw.exeJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6320:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7068:120:WilError_01
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMutant created: \Sessions\1\BaseNamedObjects\pJktCtXORtNqXwNSpkLJlHm
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{faa60493-d519-4c8d-8ff8-8e7cd20e9967}
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeFile created: C:\Users\user\AppData\Local\Temp\tmp105.tmpJump to behavior
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.678988274.0000000003133000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.678988274.0000000003133000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.678988274.0000000003133000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.678988274.0000000003133000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.678988274.0000000003133000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.678988274.0000000003133000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.678988274.0000000003133000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.678988274.0000000003133000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.678988274.0000000003133000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeFile read: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe:Zone.IdentifierJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe 'C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe'
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VwvbEzxTQmiw' /XML 'C:\Users\user\AppData\Local\Temp\tmp105.tmp'
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess created: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VwvbEzxTQmiw' /XML 'C:\Users\user\AppData\Local\Temp\tmp774E.tmp'
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VwvbEzxTQmiw' /XML 'C:\Users\user\AppData\Local\Temp\tmp105.tmp'
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess created: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VwvbEzxTQmiw' /XML 'C:\Users\user\AppData\Local\Temp\tmp774E.tmp'
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
    Source: INVOIC #CTR 110510H001347.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: INVOIC #CTR 110510H001347.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: System.pdbE source: INVOIC #CTR 110510H001347.exe, 00000006.00000003.911566189.00000000066E9000.00000004.00000001.sdmp
    Source: Binary string: \??\C:\Windows\dll\System.pdb6 source: INVOIC #CTR 110510H001347.exe, 00000006.00000003.911586437.00000000066F9000.00000004.00000001.sdmp
    Source: Binary string: symbols\dll\System.pdb*Z source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.918913855.000000000105C000.00000004.00000001.sdmp
    Source: Binary string: \??\C:\Windows\symbols\dll\System.pdbl source: INVOIC #CTR 110510H001347.exe, 00000006.00000003.911566189.00000000066E9000.00000004.00000001.sdmp
    Source: Binary string: i,C:\Windows\System.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.918913855.000000000105C000.00000004.00000001.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000003.911586437.00000000066F9000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmp
    Source: Binary string: \??\C:\Windows\System.pdb9 source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.923955790.00000000066C2000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmp
    Source: Binary string: \??\C:\Windows\System.pdbt source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.923955790.00000000066C2000.00000004.00000001.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmp
    Source: Binary string: System.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000003.911586437.00000000066F9000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmp

    Data Obfuscation:

    barindex
    Detected unpacking (changes PE section rights)Show sources
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeUnpacked PE file: 0.2.INVOIC #CTR 110510H001347.exe.ca0000.0.unpack >yhX~ gc:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeUnpacked PE file: 8.2.dhcpmon.exe.480000.0.unpack >yhX~ gc:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
    .NET source code contains potential unpackerShow sources
    Source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 18.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 18.2.dhcpmon.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: INVOIC #CTR 110510H001347.exeStatic PE information: section name: >yhX~ gc
    Source: INVOIC #CTR 110510H001347.exeStatic PE information: section name:
    Source: VwvbEzxTQmiw.exe.0.drStatic PE information: section name: >yhX~ gc
    Source: VwvbEzxTQmiw.exe.0.drStatic PE information: section name:
    Source: dhcpmon.exe.6.drStatic PE information: section name: >yhX~ gc
    Source: dhcpmon.exe.6.drStatic PE information: section name:
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_00D59973 push ds; ret
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_00D58D7C pushad ; iretd
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_01759523 push ds; ret
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_0175952D push ds; ret
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_01757FC9 push dword ptr [esp+edi*4]; ret
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_01757FBF push dword ptr [esp+edi*4]; ret
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_05652391 push B0056391h; retf
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_0085F692 push cs; retf
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_0085F6C8 push cs; retf
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_0085FACA push ss; retf
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_0085F6E0 push cs; retf
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_0085FC02 push ds; retf
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_0085FC14 push ds; retf
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_0085F416 push cs; retf
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_0085FC26 push ds; retf
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_062FB622 push 8B000005h; retf
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_0715FCC2 push eax; retf
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_00539973 push ds; ret
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_00538D7C pushad ; iretd
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_01017FBF push dword ptr [esp+edi*4]; ret
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_01017FC9 push dword ptr [esp+edi*4]; ret
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_010136C9 push ss; iretd
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_099175F1 push ss; retf
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09917902 push ss; retf
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_0991A149 push ss; retf
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_099128D9 push ss; retf
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_099128FD push ss; retf
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09917848 push ss; retf
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_0991287D push ss; retf
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09918060 push ss; retf
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_09917F87 push ss; retf
    Source: initial sampleStatic PE information: section name: >yhX~ gc entropy: 7.99979614293
    Source: initial sampleStatic PE information: section name: >yhX~ gc entropy: 7.99979614293
    Source: initial sampleStatic PE information: section name: >yhX~ gc entropy: 7.99979614293
    Source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 18.2.dhcpmon.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 18.2.dhcpmon.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeFile created: C:\Users\user\AppData\Roaming\VwvbEzxTQmiw.exeJump to dropped file
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

    Boot Survival:

    barindex
    Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VwvbEzxTQmiw' /XML 'C:\Users\user\AppData\Local\Temp\tmp105.tmp'

    Hooking and other Techniques for Hiding and Protection:

    barindex
    Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeFile opened: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe:Zone.Identifier read attributes | delete
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion:

    barindex
    Yara detected AntiVM3Show sources
    Source: Yara matchFile source: 00000000.00000002.678988274.0000000003133000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 6720, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4552, type: MEMORY
    Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.678988274.0000000003133000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.678988274.0000000003133000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWindow / User API: threadDelayed 4426
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWindow / User API: threadDelayed 4894
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWindow / User API: foregroundWindowGot 700
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWindow / User API: foregroundWindowGot 627
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe TID: 6724Thread sleep time: -99218s >= -30000s
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe TID: 6752Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe TID: 6900Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe TID: 6336Thread sleep time: -11068046444225724s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2456Thread sleep time: -104291s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6280Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6928Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6748Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeThread delayed: delay time: 99218
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 104291
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.924656572.0000000006B40000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
    Source: dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: vmware
    Source: dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
    Source: dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
    Source: dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
    Source: dhcpmon.exe, 00000008.00000003.733161877.000000000B560000.00000004.00000001.sdmpBinary or memory string: .egaqEmuQgQ
    Source: dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: VMWARE
    Source: dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.924656572.0000000006B40000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.924656572.0000000006B40000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
    Source: dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
    Source: dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
    Source: dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.924656572.0000000006B40000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess information queried: ProcessInformation

    Anti Debugging:

    barindex
    Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)Show sources
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 0_2_01751758 CheckRemoteDebuggerPresent,
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess queried: DebugPort
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess queried: DebugPort
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess queried: DebugPort
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess queried: DebugPort
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess token adjusted: Debug
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeMemory allocated: page read and write | page guard

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Injects a PE file into a foreign processesShow sources
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeMemory written: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe base: 400000 value starts with: 4D5A
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VwvbEzxTQmiw' /XML 'C:\Users\user\AppData\Local\Temp\tmp105.tmp'
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeProcess created: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VwvbEzxTQmiw' /XML 'C:\Users\user\AppData\Local\Temp\tmp774E.tmp'
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpBinary or memory string: Program Manager
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919053113.0000000001510000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919053113.0000000001510000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.924854119.0000000006FEC000.00000004.00000001.sdmpBinary or memory string: Program Managerram Manager
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpBinary or memory string: Program ManagerD$Vkp8
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.922803271.0000000005E1B000.00000004.00000001.sdmpBinary or memory string: Program Managerram Manager4g
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.920215931.00000000031AF000.00000004.00000001.sdmpBinary or memory string: Program Manager8
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919631028.0000000002DC8000.00000004.00000001.sdmpBinary or memory string: Program Managerx
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919053113.0000000001510000.00000002.00000001.sdmpBinary or memory string: Progmanlock
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.923803296.000000000657C000.00000004.00000001.sdmpBinary or memory string: Program Manager4
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919821191.0000000002F1A000.00000004.00000001.sdmpBinary or memory string: Program ManagerHaVk8
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.923060986.000000000607B000.00000004.00000001.sdmpBinary or memory string: Program Manager
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.923456831.00000000062BC000.00000004.00000001.sdmpBinary or memory string: Program Manager x
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeQueries volume information: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe VolumeInformation
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeQueries volume information: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe VolumeInformation
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeCode function: 6_2_07151FF0 GetSystemTimes,
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

    Stealing of Sensitive Information:

    barindex
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 00000012.00000002.749734495.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.738973461.0000000003828000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.922946801.0000000005F10000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.917997308.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.920330118.0000000003BF1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000012.00000002.751674147.0000000002911000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000012.00000002.751817230.0000000003919000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.681081392.0000000004137000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1256, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 7112, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 6720, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4552, type: MEMORY
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.3c0cff9.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.5f14629.23.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.5f10000.22.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.2.dhcpmon.exe.38dc850.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.3bf454d.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.395ff24.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.5f10000.22.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.396454d.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.395ff24.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.3c089d0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.3c089d0.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.395b0ee.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.2.dhcpmon.exe.38dc850.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.raw.unpack, type: UNPACKEDPE

    Remote Access Functionality:

    barindex
    Detected Nanocore RatShow sources
    Source: INVOIC #CTR 110510H001347.exe, 00000000.00000002.681081392.0000000004137000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.924419002.0000000006AC0000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: INVOIC #CTR 110510H001347.exe, 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: dhcpmon.exe, 00000008.00000002.738973461.0000000003828000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 00000012.00000002.749734495.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 00000012.00000002.751674147.0000000002911000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 00000012.00000002.749734495.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.738973461.0000000003828000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.922946801.0000000005F10000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.917997308.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.920330118.0000000003BF1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000012.00000002.751674147.0000000002911000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000012.00000002.751817230.0000000003919000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.681081392.0000000004137000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1256, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 7112, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: INVOIC #CTR 110510H001347.exe PID: 6720, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4552, type: MEMORY
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.3c0cff9.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.5f14629.23.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.5f10000.22.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.2.dhcpmon.exe.38dc850.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.3bf454d.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.395ff24.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.5f10000.22.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.396454d.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.395ff24.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.3c089d0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.INVOIC #CTR 110510H001347.exe.3c089d0.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.395b0ee.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.2.dhcpmon.exe.38dc850.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.INVOIC #CTR 110510H001347.exe.41ec490.2.raw.unpack, type: UNPACKEDPE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Process Injection112Masquerading2Input Capture21System Time Discovery1Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryQuery Registry1Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion41Security Account ManagerSecurity Software Discovery331SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsVirtualization/Sandbox Evasion41SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information3DCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing23Proc FilesystemSystem Information Discovery13Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 412100 Sample: INVOIC #CTR 110510H001347.exe Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 44 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->44 46 Found malware configuration 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 15 other signatures 2->50 7 INVOIC #CTR 110510H001347.exe 7 2->7         started        11 dhcpmon.exe 5 2->11         started        process3 file4 28 C:\Users\user\AppData\...\VwvbEzxTQmiw.exe, PE32 7->28 dropped 30 C:\Users\...\VwvbEzxTQmiw.exe:Zone.Identifier, ASCII 7->30 dropped 32 C:\Users\user\AppData\Local\Temp\tmp105.tmp, XML 7->32 dropped 34 C:\...\INVOIC #CTR 110510H001347.exe.log, ASCII 7->34 dropped 52 Injects a PE file into a foreign processes 7->52 13 INVOIC #CTR 110510H001347.exe 1 12 7->13         started        18 schtasks.exe 1 7->18         started        20 schtasks.exe 1 11->20         started        22 dhcpmon.exe 2 11->22         started        signatures5 process6 dnsIp7 42 79.134.225.17, 2050, 49745, 49747 FINK-TELECOM-SERVICESCH Switzerland 13->42 36 C:\Program Files (x86)\...\dhcpmon.exe, PE32 13->36 dropped 38 C:\Users\user\AppData\Roaming\...\run.dat, data 13->38 dropped 40 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 13->40 dropped 54 Hides that the sample has been downloaded from the Internet (zone.identifier) 13->54 24 conhost.exe 18->24         started        26 conhost.exe 20->26         started        file8 signatures9 process10

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    INVOIC #CTR 110510H001347.exe100%Joe Sandbox ML

    Dropped Files

    SourceDetectionScannerLabelLink
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Roaming\VwvbEzxTQmiw.exe100%Joe Sandbox ML
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe30%ReversingLabsWin32.Trojan.AgentTesla
    C:\Users\user\AppData\Roaming\VwvbEzxTQmiw.exe30%ReversingLabsWin32.Trojan.AgentTesla

    Unpacked PE Files

    SourceDetectionScannerLabelLinkDownload
    6.2.INVOIC #CTR 110510H001347.exe.5f10000.22.unpack100%AviraTR/NanoCore.fadteDownload File
    6.2.INVOIC #CTR 110510H001347.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    8.2.dhcpmon.exe.480000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
    0.2.INVOIC #CTR 110510H001347.exe.ca0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
    18.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    6.2.INVOIC #CTR 110510H001347.exe.3c089d0.9.unpack100%AviraTR/NanoCore.fadteDownload File

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    79.134.225.171%VirustotalBrowse
    79.134.225.170%Avira URL Cloudsafe
    http://checkip.dyndns.org/0%VirustotalBrowse
    http://checkip.dyndns.org/0%Avira URL Cloudsafe
    http://servermanager.miixit.org/index_ru.html0%Avira URL Cloudsafe
    http://servermanager.miixit.org/index_ru.htmlc0%Avira URL Cloudsafe
    http://servermanager.miixit.org/report/reporter_index.php?name=0%Avira URL Cloudsafe
    http://servermanager.miixit.org/10%Avira URL Cloudsafe
    http://servermanager.miixit.org/downloads/0%Avira URL Cloudsafe
    http://servermanager.miixit.org/hits/hit_index.php?k=0%Avira URL Cloudsafe
    127.0.0.10%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    79.134.225.17true
    • 1%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    127.0.0.1true
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://checkip.dyndns.org/dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CJU3DBQXBUQPCINVOIC #CTR 110510H001347.exe, 00000000.00000003.667947872.00000000036A0000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpfalse
      high
      http://servermanager.miixit.org/index_ru.htmlINVOIC #CTR 110510H001347.exe, 00000000.00000003.667947872.00000000036A0000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://servermanager.miixit.org/index_ru.htmlcINVOIC #CTR 110510H001347.exe, 00000000.00000003.667947872.00000000036A0000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://servermanager.miixit.org/report/reporter_index.php?name=dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://servermanager.miixit.org/1dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameINVOIC #CTR 110510H001347.exe, 00000000.00000002.680822597.00000000035F0000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpfalse
        high
        https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssINVOIC #CTR 110510H001347.exe, 00000000.00000002.678988274.0000000003133000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmpfalse
          high
          https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CJU3DBQXBUQPC5http://servermanaINVOIC #CTR 110510H001347.exe, 00000000.00000003.667947872.00000000036A0000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpfalse
            high
            http://servermanager.miixit.org/downloads/dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://servermanager.miixit.org/hits/hit_index.php?k=INVOIC #CTR 110510H001347.exe, 00000000.00000003.667947872.00000000036A0000.00000004.00000001.sdmp, dhcpmon.exe, 00000008.00000002.736440488.00000000027D1000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            79.134.225.17
            unknownSwitzerland
            6775FINK-TELECOM-SERVICESCHtrue

            General Information

            Joe Sandbox Version:32.0.0 Black Diamond
            Analysis ID:412100
            Start date:12.05.2021
            Start time:12:05:57
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 12m 41s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:INVOIC #CTR 110510H001347.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:29
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@12/12@0/1
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 1.6% (good quality ratio 0.9%)
            • Quality average: 35.1%
            • Quality standard deviation: 37.1%
            HCA Information:
            • Successful, ratio: 94%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            Warnings:
            Show All
            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
            • TCP Packets have been reduced to 100
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            12:06:54API Interceptor965x Sleep call for process: INVOIC #CTR 110510H001347.exe modified
            12:07:04AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
            12:07:20API Interceptor2x Sleep call for process: dhcpmon.exe modified

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            79.134.225.17RFQEMFA.Elektrik.exeGet hashmaliciousBrowse
              RFQEMFA.Elektrik.pdf.exeGet hashmaliciousBrowse
                Payment Advice-BCS_ECS9522020909153934_3159_952.jarGet hashmaliciousBrowse
                  CEtaNfFFTl.exeGet hashmaliciousBrowse

                    Domains

                    No context

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    FINK-TELECOM-SERVICESCH13efMb6ayq.exeGet hashmaliciousBrowse
                    • 79.134.225.47
                    PO #KV18RE001-A5491.exeGet hashmaliciousBrowse
                    • 79.134.225.91
                    Devizni izvod za partiju 0050100073053.exeGet hashmaliciousBrowse
                    • 79.134.225.71
                    QwUl4FaToe.exeGet hashmaliciousBrowse
                    • 79.134.225.71
                    IMG_1035852_607.exeGet hashmaliciousBrowse
                    • 79.134.225.10
                    RFQEMFA.Elektrik.exeGet hashmaliciousBrowse
                    • 79.134.225.17
                    Waybill Document 22700456.exeGet hashmaliciousBrowse
                    • 79.134.225.7
                    Give Offer CVE6535 _TVOP-MIO, pdf.exeGet hashmaliciousBrowse
                    • 79.134.225.8
                    Waybill Document 22700456.exeGet hashmaliciousBrowse
                    • 79.134.225.7
                    RFQEMFA.Elektrik.pdf.exeGet hashmaliciousBrowse
                    • 79.134.225.17
                    w85rzxid7y.exeGet hashmaliciousBrowse
                    • 79.134.225.81
                    Remittance E-MAIL Layout - 10_.jarGet hashmaliciousBrowse
                    • 79.134.225.106
                    s65eJyjKga.exeGet hashmaliciousBrowse
                    • 79.134.225.47
                    new order.xlsxGet hashmaliciousBrowse
                    • 79.134.225.47
                    Ot3srIM10B.exeGet hashmaliciousBrowse
                    • 79.134.225.47
                    Remittance E-MAIL Layout - 10_.jarGet hashmaliciousBrowse
                    • 79.134.225.106
                    wnQXyfONbS.exeGet hashmaliciousBrowse
                    • 79.134.225.82
                    kwK4iGa9DL.exeGet hashmaliciousBrowse
                    • 79.134.225.47
                    Remittance E-MAIL Layout - 10_.jarGet hashmaliciousBrowse
                    • 79.134.225.106
                    4z9Saf2vu3.exeGet hashmaliciousBrowse
                    • 79.134.225.47

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    Process:C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):934912
                    Entropy (8bit):7.916649908062416
                    Encrypted:false
                    SSDEEP:24576:NmSz7Ihj1Tkub+q4ze1jYRxBocOdZngrMP+WW:NZ7IhZ/kPXBo/dZgrg
                    MD5:B3C101859298060C18A83B28D0449325
                    SHA1:A8A4686C8E0D75ED10EEFA59B01E3DA7215C846F
                    SHA-256:47FCFE4B9687B8DDC8CE16C961D78A9941FA483400898E43CB4B2B8F3863F6D5
                    SHA-512:50DFDD259630B934C252DAC2D9FA93535975ECC24933EF8F9FA2F382E9FCFE1DF9DC5640090CFF54E27B8923CD11C07D81CABC7D26B2F6A0A91E5D309D8CC0EF
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 30%
                    Reputation:low
                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....`..............P......~............... ....@.. ....................................@.................................P...K.......h...............................................................................................H...........>yhX~ gc.... ......................@....text...(........................... ..`.rsrc...h............^..............@..@.reloc...............@..............@..B.....................B.............. ..`........................................................................................................................................................................................................................................................................................................................................................................................................................................
                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                    Process:C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview: [ZoneTransfer]....ZoneId=0
                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\INVOIC #CTR 110510H001347.exe.log
                    Process:C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):1314
                    Entropy (8bit):5.350128552078965
                    Encrypted:false
                    SSDEEP:24:ML9E4Ks2f84jE4Kx1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MxHKXfvjHKx1qHiYHKhQnoPtHoxHhAHR
                    MD5:8198C64CE0786EABD4C792E7E6FC30E5
                    SHA1:71E1676126F4616B18C751A0A775B2D64944A15A
                    SHA-256:C58018934011086A883D1D56B21F6C1916B1CD83206ADD1865C9BDD29DADCBC4
                    SHA-512:EE293C0F88A12AB10041F66DDFAE89BC11AB3B3AAD8604F1A418ABE43DF0980245C3B7F8FEB709AEE8E9474841A280E073EC063045EA39948E853AA6B4EC0FB0
                    Malicious:true
                    Reputation:moderate, very likely benign file
                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1314
                    Entropy (8bit):5.350128552078965
                    Encrypted:false
                    SSDEEP:24:ML9E4Ks2f84jE4Kx1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MxHKXfvjHKx1qHiYHKhQnoPtHoxHhAHR
                    MD5:8198C64CE0786EABD4C792E7E6FC30E5
                    SHA1:71E1676126F4616B18C751A0A775B2D64944A15A
                    SHA-256:C58018934011086A883D1D56B21F6C1916B1CD83206ADD1865C9BDD29DADCBC4
                    SHA-512:EE293C0F88A12AB10041F66DDFAE89BC11AB3B3AAD8604F1A418ABE43DF0980245C3B7F8FEB709AEE8E9474841A280E073EC063045EA39948E853AA6B4EC0FB0
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                    C:\Users\user\AppData\Local\Temp\tmp105.tmp
                    Process:C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1645
                    Entropy (8bit):5.188820245964276
                    Encrypted:false
                    SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBG4vtn:cbhK79lNQR/rydbz9I3YODOLNdq3ll
                    MD5:9B989C0F68076ED2986341E318A2197A
                    SHA1:B9FE887FBAEF386128100252F79C0F20CAC7BFF3
                    SHA-256:1D2CE38B7ACAD43D02317ADD0BE5496BCD0EF1CA34E0E2896165C02C48988029
                    SHA-512:3668AEDA7F4DEEA1400E810FD86E4F66C4663390F8683D6965340B528A65D1038BE3A439E5DDCBB5DE4816BB0ED2F29BE08D6D5327B732ECAE0C562BE2CD80F6
                    Malicious:true
                    Reputation:low
                    Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                    C:\Users\user\AppData\Local\Temp\tmp774E.tmp
                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1645
                    Entropy (8bit):5.188820245964276
                    Encrypted:false
                    SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBG4vtn:cbhK79lNQR/rydbz9I3YODOLNdq3ll
                    MD5:9B989C0F68076ED2986341E318A2197A
                    SHA1:B9FE887FBAEF386128100252F79C0F20CAC7BFF3
                    SHA-256:1D2CE38B7ACAD43D02317ADD0BE5496BCD0EF1CA34E0E2896165C02C48988029
                    SHA-512:3668AEDA7F4DEEA1400E810FD86E4F66C4663390F8683D6965340B528A65D1038BE3A439E5DDCBB5DE4816BB0ED2F29BE08D6D5327B732ECAE0C562BE2CD80F6
                    Malicious:false
                    Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                    Process:C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):1856
                    Entropy (8bit):7.024371743172393
                    Encrypted:false
                    SSDEEP:48:Ik/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrw8:flC0IlC0IlC0IlC0IlC0IlC0IlC0IlCr
                    MD5:838CD9DBC78EA45A5406EAE23962086D
                    SHA1:C8273AACDEE03AC0CDCDDBAA83F51D04D6A4203C
                    SHA-256:6E11A62511C5BBC0413128305069B780C448684B54FAA3E8DD0B4FD3DB8C9867
                    SHA-512:F7D25EF1FA6F50667DD6785CC774E0AA6BC52A2231FE96E7C59D14EFDFDDA076F6399288CF6EAC8EFA8A75727893432AA155DA0E392F8CD1F26C5C5871EAC6B5
                    Malicious:false
                    Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                    Process:C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):8
                    Entropy (8bit):3.0
                    Encrypted:false
                    SSDEEP:3:Gni:Gni
                    MD5:C8B5B8420FF5F87754034C50E72752FA
                    SHA1:49EFDF30E91DEEB691C5E9C873E03AEAAB585A35
                    SHA-256:69259AC8442DD8348D7A68821FBF5AFAB27269D29F2860AF520AE66F592C7A8A
                    SHA-512:8F7D7D3ACAA5D4F7203D5BE51AACE7059BF04E33D0DD181948C93D154C6657107990E819C0C93F0974F76B909B28A69CEC91DD9A5F5E68B06E8D2A797529A90A
                    Malicious:true
                    Preview: .f=.-..H
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                    Process:C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe
                    File Type:data
                    Category:modified
                    Size (bytes):40
                    Entropy (8bit):5.221928094887364
                    Encrypted:false
                    SSDEEP:3:9bzY6oRDMjmPl:RzWDMCd
                    MD5:AE0F5E6CE7122AF264EC533C6B15A27B
                    SHA1:1265A495C42EED76CC043D50C60C23297E76CCE1
                    SHA-256:73B0B92179C61C26589B47E9732CE418B07EDEE3860EE5A2A5FB06F3B8AA9B26
                    SHA-512:DD44C2D24D4E3A0F0B988AD3D04683B5CB128298043134649BBE33B2512CE0C9B1A8E7D893B9F66FBBCDD901E2B0646C4533FB6C0C8C4AFCB95A0EFB95D446F8
                    Malicious:false
                    Preview: 9iH...}Z.4..f..... 8.j....|.&X..e.F.*.
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                    Process:C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):327432
                    Entropy (8bit):7.99938831605763
                    Encrypted:true
                    SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                    MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                    SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                    SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                    SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                    Malicious:false
                    Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                    C:\Users\user\AppData\Roaming\VwvbEzxTQmiw.exe
                    Process:C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):934912
                    Entropy (8bit):7.916649908062416
                    Encrypted:false
                    SSDEEP:24576:NmSz7Ihj1Tkub+q4ze1jYRxBocOdZngrMP+WW:NZ7IhZ/kPXBo/dZgrg
                    MD5:B3C101859298060C18A83B28D0449325
                    SHA1:A8A4686C8E0D75ED10EEFA59B01E3DA7215C846F
                    SHA-256:47FCFE4B9687B8DDC8CE16C961D78A9941FA483400898E43CB4B2B8F3863F6D5
                    SHA-512:50DFDD259630B934C252DAC2D9FA93535975ECC24933EF8F9FA2F382E9FCFE1DF9DC5640090CFF54E27B8923CD11C07D81CABC7D26B2F6A0A91E5D309D8CC0EF
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 30%
                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....`..............P......~............... ....@.. ....................................@.................................P...K.......h...............................................................................................H...........>yhX~ gc.... ......................@....text...(........................... ..`.rsrc...h............^..............@..@.reloc...............@..............@..B.....................B.............. ..`........................................................................................................................................................................................................................................................................................................................................................................................................................................
                    C:\Users\user\AppData\Roaming\VwvbEzxTQmiw.exe:Zone.Identifier
                    Process:C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Preview: [ZoneTransfer]....ZoneId=0

                    Static File Info

                    General

                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):7.916649908062416
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    • Win32 Executable (generic) a (10002005/4) 49.96%
                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:INVOIC #CTR 110510H001347.exe
                    File size:934912
                    MD5:b3c101859298060c18a83b28d0449325
                    SHA1:a8a4686c8e0d75ed10eefa59b01e3da7215c846f
                    SHA256:47fcfe4b9687b8ddc8ce16c961d78a9941fa483400898e43cb4b2b8f3863f6d5
                    SHA512:50dfdd259630b934c252dac2d9fa93535975ecc24933ef8f9fa2f382e9fcfe1df9dc5640090cff54e27b8923cd11c07d81cabc7d26b2f6a0a91e5d309d8cc0ef
                    SSDEEP:24576:NmSz7Ihj1Tkub+q4ze1jYRxBocOdZngrMP+WW:NZ7IhZ/kPXBo/dZgrg
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P......~............... ....@.. ....................................@................................

                    File Icon

                    Icon Hash:eaee8e96b2a8e0b2

                    Static PE Info

                    General

                    Entrypoint:0x4ea00a
                    Entrypoint Section:
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Time Stamp:0x609B83F4 [Wed May 12 07:29:56 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:v4.0.30319
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                    Entrypoint Preview

                    Instruction
                    jmp dword ptr [004EA000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al

                    Data Directories

                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xcc9500x4b.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xd80000xe168.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xe80000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0xea0000x8
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0xcc0000x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                    Sections

                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    >yhX~ gc0x20000xc99ec0xc9a00False1.00031603573data7.99979614293IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                    .text0xcc0000xbf280xc000False0.445739746094data6.00898144669IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    .rsrc0xd80000xe1680xe200False0.101597068584data3.99525695822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0xe80000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    0xea0000x100x200False0.044921875data0.142635768149IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ

                    Resources

                    NameRVASizeTypeLanguageCountry
                    RT_ICON0xd81600xd228data
                    RT_GROUP_ICON0xe53880x14data
                    RT_GROUP_ICON0xe539c0x14data
                    RT_VERSION0xe53b00x34cdata
                    RT_MANIFEST0xe56fc0xa65XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                    Imports

                    DLLImport
                    mscoree.dll_CorExeMain

                    Version Infos

                    DescriptionData
                    Translation0x0000 0x04b0
                    LegalCopyrightCopyright 2013
                    Assembly Version3.0.0.0
                    InternalNameIDisposable.exe
                    FileVersion3.0.0.0
                    CompanyName
                    LegalTrademarks
                    Comments
                    ProductNameServerManager_Core
                    ProductVersion3.0.0.0
                    FileDescriptionServerManager_Core
                    OriginalFilenameIDisposable.exe

                    Network Behavior

                    Snort IDS Alerts

                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    05/12/21-12:07:03.337304TCP2025019ET TROJAN Possible NanoCore C2 60B497452050192.168.2.479.134.225.17
                    05/12/21-12:07:11.350358TCP2025019ET TROJAN Possible NanoCore C2 60B497472050192.168.2.479.134.225.17
                    05/12/21-12:07:16.366739TCP2025019ET TROJAN Possible NanoCore C2 60B497492050192.168.2.479.134.225.17
                    05/12/21-12:07:21.433183TCP2025019ET TROJAN Possible NanoCore C2 60B497522050192.168.2.479.134.225.17
                    05/12/21-12:07:28.809574TCP2025019ET TROJAN Possible NanoCore C2 60B497542050192.168.2.479.134.225.17
                    05/12/21-12:07:35.696516TCP2025019ET TROJAN Possible NanoCore C2 60B497552050192.168.2.479.134.225.17
                    05/12/21-12:07:42.247073TCP2025019ET TROJAN Possible NanoCore C2 60B497572050192.168.2.479.134.225.17
                    05/12/21-12:07:49.248392TCP2025019ET TROJAN Possible NanoCore C2 60B497662050192.168.2.479.134.225.17
                    05/12/21-12:07:54.256073TCP2025019ET TROJAN Possible NanoCore C2 60B497702050192.168.2.479.134.225.17
                    05/12/21-12:07:59.247476TCP2025019ET TROJAN Possible NanoCore C2 60B497762050192.168.2.479.134.225.17
                    05/12/21-12:08:04.261371TCP2025019ET TROJAN Possible NanoCore C2 60B497772050192.168.2.479.134.225.17
                    05/12/21-12:08:10.746825TCP2025019ET TROJAN Possible NanoCore C2 60B497782050192.168.2.479.134.225.17
                    05/12/21-12:08:15.746559TCP2025019ET TROJAN Possible NanoCore C2 60B497792050192.168.2.479.134.225.17
                    05/12/21-12:08:20.812627TCP2025019ET TROJAN Possible NanoCore C2 60B497802050192.168.2.479.134.225.17
                    05/12/21-12:08:26.891338TCP2025019ET TROJAN Possible NanoCore C2 60B497812050192.168.2.479.134.225.17
                    05/12/21-12:08:32.935138TCP2025019ET TROJAN Possible NanoCore C2 60B497832050192.168.2.479.134.225.17
                    05/12/21-12:08:37.967837TCP2025019ET TROJAN Possible NanoCore C2 60B497852050192.168.2.479.134.225.17
                    05/12/21-12:08:44.998406TCP2025019ET TROJAN Possible NanoCore C2 60B497862050192.168.2.479.134.225.17
                    05/12/21-12:08:50.031553TCP2025019ET TROJAN Possible NanoCore C2 60B497872050192.168.2.479.134.225.17
                    05/12/21-12:08:56.938302TCP2025019ET TROJAN Possible NanoCore C2 60B497882050192.168.2.479.134.225.17

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    May 12, 2021 12:07:02.760447025 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:02.971488953 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:02.973216057 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:03.337304115 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:03.609880924 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:03.718352079 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:03.815188885 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.027542114 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.051933050 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.333517075 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.333610058 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.333837032 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.333868027 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.333925009 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.334146976 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.334330082 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.334393978 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.544821024 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.545897961 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.545973063 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.546480894 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.546920061 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.546946049 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.547002077 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.547184944 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.547224045 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.547266960 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.547339916 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.547391891 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.757356882 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.757411003 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.757467031 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.757541895 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.757544041 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.757649899 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.757700920 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.757782936 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.758155107 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.758212090 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.758219957 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.758270979 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.758548975 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.758584023 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.758789062 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.758905888 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.759063005 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.759228945 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.759309053 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.759345055 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.759428978 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.759474039 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.759502888 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.759594917 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.968822956 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.969059944 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.969090939 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.969177008 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.969212055 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.969558001 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.969624996 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.971502066 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.971748114 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.971846104 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.971959114 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.972376108 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.972448111 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.972615957 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.972743034 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.972799063 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.973212004 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.973401070 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.973457098 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.973718882 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.973771095 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.973833084 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.973983049 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.974031925 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.974411964 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.974637032 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.974688053 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.974955082 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.975132942 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.975261927 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.975306034 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.975794077 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.975902081 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.975969076 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.976036072 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.976171970 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.976214886 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.976278067 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.976346016 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.976387024 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.976413012 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.976583958 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.976627111 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.976705074 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.976777077 CEST20504974579.134.225.17192.168.2.4
                    May 12, 2021 12:07:04.976823092 CEST497452050192.168.2.479.134.225.17
                    May 12, 2021 12:07:04.976878881 CEST20504974579.134.225.17192.168.2.4

                    Code Manipulations

                    Statistics

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:12:06:47
                    Start date:12/05/2021
                    Path:C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe'
                    Imagebase:0xca0000
                    File size:934912 bytes
                    MD5 hash:B3C101859298060C18A83B28D0449325
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.678988274.0000000003133000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.681081392.0000000004137000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.681081392.0000000004137000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.681081392.0000000004137000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    Reputation:low

                    General

                    Start time:12:06:57
                    Start date:12/05/2021
                    Path:C:\Windows\SysWOW64\schtasks.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VwvbEzxTQmiw' /XML 'C:\Users\user\AppData\Local\Temp\tmp105.tmp'
                    Imagebase:0x11f0000
                    File size:185856 bytes
                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:12:06:57
                    Start date:12/05/2021
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff724c50000
                    File size:625664 bytes
                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:12:06:58
                    Start date:12/05/2021
                    Path:C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\INVOIC #CTR 110510H001347.exe
                    Imagebase:0x790000
                    File size:934912 bytes
                    MD5 hash:B3C101859298060C18A83B28D0449325
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.922515364.0000000005650000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.922515364.0000000005650000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.924419002.0000000006AC0000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.924419002.0000000006AC0000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.924619659.0000000006B30000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.924619659.0000000006B30000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.919364714.0000000002BF8000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.922946801.0000000005F10000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.922946801.0000000005F10000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.922946801.0000000005F10000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.917997308.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.917997308.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.917997308.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.924483216.0000000006AE0000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.924483216.0000000006AE0000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.920330118.0000000003BF1000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.922665909.00000000056A0000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.922665909.00000000056A0000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.923514818.00000000062D0000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.923514818.00000000062D0000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.924513831.0000000006AF0000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.924513831.0000000006AF0000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.922694661.00000000056C0000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.922694661.00000000056C0000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.923487313.00000000062C0000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.923487313.00000000062C0000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.922580530.0000000005680000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.922580530.0000000005680000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.920693142.0000000003E91000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.922431506.0000000005630000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.922431506.0000000005630000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.922598044.0000000005690000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.922598044.0000000005690000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.923603184.00000000062E0000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.923603184.00000000062E0000.00000004.00000001.sdmp, Author: Florian Roth
                    Reputation:low

                    General

                    Start time:12:07:12
                    Start date:12/05/2021
                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                    Imagebase:0x480000
                    File size:934912 bytes
                    MD5 hash:B3C101859298060C18A83B28D0449325
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.738973461.0000000003828000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.738973461.0000000003828000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.738973461.0000000003828000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000008.00000002.736570519.0000000002821000.00000004.00000001.sdmp, Author: Joe Security
                    Antivirus matches:
                    • Detection: 100%, Joe Sandbox ML
                    • Detection: 30%, ReversingLabs
                    Reputation:low

                    General

                    Start time:12:07:23
                    Start date:12/05/2021
                    Path:C:\Windows\SysWOW64\schtasks.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VwvbEzxTQmiw' /XML 'C:\Users\user\AppData\Local\Temp\tmp774E.tmp'
                    Imagebase:0x11f0000
                    File size:185856 bytes
                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:12:07:24
                    Start date:12/05/2021
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff724c50000
                    File size:625664 bytes
                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:12:07:25
                    Start date:12/05/2021
                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    Imagebase:0x4e0000
                    File size:934912 bytes
                    MD5 hash:B3C101859298060C18A83B28D0449325
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.749734495.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.749734495.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.749734495.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.751674147.0000000002911000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.751674147.0000000002911000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.751817230.0000000003919000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.751817230.0000000003919000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    Reputation:low

                    Disassembly

                    Code Analysis

                    Reset < >