Loading ...

Play interactive tourEdit tour

Analysis Report aISbFyk4Lj.exe

Overview

General Information

Sample Name:aISbFyk4Lj.exe
Analysis ID:412223
MD5:167f0a829df709cc4107369ed23fbdfb
SHA1:a66caacf3bd0390912ab789b7e773e805172ba4c
SHA256:12279e26650d5826758ae344bc6ffef54a438d4782a42f0d369403ae41f3914b
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

NanoCore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected AntiVM3
Yara detected Nanocore RAT
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • aISbFyk4Lj.exe (PID: 3288 cmdline: 'C:\Users\user\Desktop\aISbFyk4Lj.exe' MD5: 167F0A829DF709CC4107369ED23FBDFB)
    • schtasks.exe (PID: 2200 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QxHKzIlUxTf' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EF.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 1724 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe MD5: 71369277D09DA0830C8C59F9E22BB23A)
    • RegSvcs.exe (PID: 5884 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe MD5: 71369277D09DA0830C8C59F9E22BB23A)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": ".0.0.0,", "Mutex": "a7fa722b-7dae-45b1-afa6-302155a5", "Group": "Default", "Domain1": "wespeaktruthtoman.sytes.net", "Domain2": "wespeaktruthtoman12.sytes.net", "Port": 5600, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000000.00000002.227998353.00000000045E1000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x279b45:$x1: NanoCore.ClientPluginHost
    • 0x2feb65:$x1: NanoCore.ClientPluginHost
    • 0x279b82:$x2: IClientNetworkHost
    • 0x2feba2:$x2: IClientNetworkHost
    • 0x27d6b5:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x3026d5:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000000.00000002.227998353.00000000045E1000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000000.00000002.227998353.00000000045E1000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x2798ad:$a: NanoCore
      • 0x2798bd:$a: NanoCore
      • 0x279af1:$a: NanoCore
      • 0x279b05:$a: NanoCore
      • 0x279b45:$a: NanoCore
      • 0x2fe8cd:$a: NanoCore
      • 0x2fe8dd:$a: NanoCore
      • 0x2feb11:$a: NanoCore
      • 0x2feb25:$a: NanoCore
      • 0x2feb65:$a: NanoCore
      • 0x27990c:$b: ClientPlugin
      • 0x279b0e:$b: ClientPlugin
      • 0x279b4e:$b: ClientPlugin
      • 0x2fe92c:$b: ClientPlugin
      • 0x2feb2e:$b: ClientPlugin
      • 0x2feb6e:$b: ClientPlugin
      • 0x279a33:$c: ProjectData
      • 0x2fea53:$c: ProjectData
      • 0x447ba0:$c: ProjectData
      • 0x27a43a:$d: DESCrypto
      • 0x2ff45a:$d: DESCrypto
      Process Memory Space: aISbFyk4Lj.exe PID: 3288JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        0.2.aISbFyk4Lj.exe.484a9b8.2.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe38d:$x1: NanoCore.ClientPluginHost
        • 0xe3ca:$x2: IClientNetworkHost
        • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        0.2.aISbFyk4Lj.exe.484a9b8.2.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe105:$x1: NanoCore Client.exe
        • 0xe38d:$x2: NanoCore.ClientPluginHost
        • 0xf9c6:$s1: PluginCommand
        • 0xf9ba:$s2: FileCommand
        • 0x1086b:$s3: PipeExists
        • 0x16622:$s4: PipeCreated
        • 0xe3b7:$s5: IClientLoggingHost
        0.2.aISbFyk4Lj.exe.484a9b8.2.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          0.2.aISbFyk4Lj.exe.484a9b8.2.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
          • 0xe0f5:$a: NanoCore
          • 0xe105:$a: NanoCore
          • 0xe339:$a: NanoCore
          • 0xe34d:$a: NanoCore
          • 0xe38d:$a: NanoCore
          • 0xe154:$b: ClientPlugin
          • 0xe356:$b: ClientPlugin
          • 0xe396:$b: ClientPlugin
          • 0xe27b:$c: ProjectData
          • 0xec82:$d: DESCrypto
          • 0x1664e:$e: KeepAlive
          • 0x1463c:$g: LogClientMessage
          • 0x10837:$i: get_Connected
          • 0xefb8:$j: #=q
          • 0xefe8:$j: #=q
          • 0xf004:$j: #=q
          • 0xf034:$j: #=q
          • 0xf050:$j: #=q
          • 0xf06c:$j: #=q
          • 0xf09c:$j: #=q
          • 0xf0b8:$j: #=q
          0.2.aISbFyk4Lj.exe.484a9b8.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x1018d:$x1: NanoCore.ClientPluginHost
          • 0x951ad:$x1: NanoCore.ClientPluginHost
          • 0x101ca:$x2: IClientNetworkHost
          • 0x951ea:$x2: IClientNetworkHost
          • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          • 0x98d1d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          Click to see the 2 entries

          Sigma Overview

          AV Detection:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 5884, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          E-Banking Fraud:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 5884, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          System Summary:

          barindex
          Sigma detected: Possible Applocker BypassShow sources
          Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ParentCommandLine: 'C:\Users\user\Desktop\aISbFyk4Lj.exe' , ParentImage: C:\Users\user\Desktop\aISbFyk4Lj.exe, ParentProcessId: 3288, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 1724

          Stealing of Sensitive Information:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 5884, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Remote Access Functionality:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 5884, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 0.2.aISbFyk4Lj.exe.484a9b8.2.raw.unpackMalware Configuration Extractor: NanoCore {"Version": ".0.0.0,", "Mutex": "a7fa722b-7dae-45b1-afa6-302155a5", "Group": "Default", "Domain1": "wespeaktruthtoman.sytes.net", "Domain2": "wespeaktruthtoman12.sytes.net", "Port": 5600, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8"}
          Multi AV Scanner detection for domain / URLShow sources
          Source: wespeaktruthtoman.sytes.netVirustotal: Detection: 8%Perma Link
          Source: wespeaktruthtoman.sytes.netVirustotal: Detection: 8%Perma Link
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Roaming\QxHKzIlUxTf.exeReversingLabs: Detection: 27%
          Multi AV Scanner detection for submitted fileShow sources
          Source: aISbFyk4Lj.exeVirustotal: Detection: 23%Perma Link
          Source: aISbFyk4Lj.exeReversingLabs: Detection: 27%
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000000.00000002.227998353.00000000045E1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0.2.aISbFyk4Lj.exe.484a9b8.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.aISbFyk4Lj.exe.484a9b8.2.raw.unpack, type: UNPACKEDPE
          Machine Learning detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Roaming\QxHKzIlUxTf.exeJoe Sandbox ML: detected
          Machine Learning detection for sampleShow sources
          Source: aISbFyk4Lj.exeJoe Sandbox ML: detected
          Source: aISbFyk4Lj.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
          Source: aISbFyk4Lj.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\aJUqyHKjYG\src\obj\Debug\getClaimsd95.pdbT source: aISbFyk4Lj.exe
          Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\aJUqyHKjYG\src\obj\Debug\getClaimsd95.pdb source: aISbFyk4Lj.exe
          Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: RegSvcs.exe, 00000004.00000003.370702724.0000000000AF9000.00000004.00000001.sdmp
          Source: Binary string: mscorrc.pdb source: aISbFyk4Lj.exe, 00000000.00000002.230993463.0000000005880000.00000002.00000001.sdmp
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: wespeaktruthtoman.sytes.net
          Source: Malware configuration extractorURLs: wespeaktruthtoman12.sytes.net
          Source: global trafficTCP traffic: 192.168.2.3:49694 -> 105.112.208.19:5600
          Source: Joe Sandbox ViewASN Name: VNL1-ASNG VNL1-ASNG
          Source: unknownDNS traffic detected: queries for: wespeaktruthtoman.sytes.net
          Source: aISbFyk4Lj.exeString found in binary or memory: http://checkip.dyndns.org/
          Source: aISbFyk4Lj.exeString found in binary or memory: http://servermanager.miixit.org/
          Source: aISbFyk4Lj.exeString found in binary or memory: http://servermanager.miixit.org/E
          Source: aISbFyk4Lj.exeString found in binary or memory: http://servermanager.miixit.org/downloads/
          Source: aISbFyk4Lj.exeString found in binary or memory: http://servermanager.miixit.org/hits/hit_index.php?k=
          Source: aISbFyk4Lj.exeString found in binary or memory: http://servermanager.miixit.org/hits/hit_index.php?k=1
          Source: aISbFyk4Lj.exeString found in binary or memory: http://servermanager.miixit.org/index_ru.html
          Source: aISbFyk4Lj.exeString found in binary or memory: http://servermanager.miixit.org/index_ru.htmlk
          Source: aISbFyk4Lj.exeString found in binary or memory: http://servermanager.miixit.org/report/reporter_index.php?name=
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
          Source: aISbFyk4Lj.exeString found in binary or memory: https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CJU3DBQXBUQPC

          E-Banking Fraud:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000000.00000002.227998353.00000000045E1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0.2.aISbFyk4Lj.exe.484a9b8.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.aISbFyk4Lj.exe.484a9b8.2.raw.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000000.00000002.227998353.00000000045E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.227998353.00000000045E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.aISbFyk4Lj.exe.484a9b8.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.aISbFyk4Lj.exe.484a9b8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.aISbFyk4Lj.exe.484a9b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.aISbFyk4Lj.exe.484a9b8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_0597184E NtQuerySystemInformation,
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_05971821 NtQuerySystemInformation,
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_00EC93F1
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_055E21B9
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_055E0440
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_055E22C4
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_055E0888
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C0D40
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C412B
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C2918
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C3908
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C2010
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C58E8
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C24E0
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C17D7
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057CEFB8
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C4A60
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057CFA20
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C0D30
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057CC520
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C2909
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C3903
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057CC9C0
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C2DA0
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C7588
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057CD878
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057CCC68
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C7068
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C705B
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C1830
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C7820
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C7810
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C7C10
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C5CFB
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057CBCE8
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C24D0
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C68D0
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057CB718
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C2310
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C7308
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C2301
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C57F1
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C6FE8
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C57B2
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C6678
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C6668
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C7A50
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C7A40
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C7620
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C62C8
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057CD2A8
          Source: aISbFyk4Lj.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: QxHKzIlUxTf.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: aISbFyk4Lj.exeBinary or memory string: OriginalFilename vs aISbFyk4Lj.exe
          Source: aISbFyk4Lj.exe, 00000000.00000002.231389678.0000000005F80000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs aISbFyk4Lj.exe
          Source: aISbFyk4Lj.exe, 00000000.00000000.215774542.0000000000EC2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamegetClaimsd95.exeF vs aISbFyk4Lj.exe
          Source: aISbFyk4Lj.exe, 00000000.00000002.230993463.0000000005880000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs aISbFyk4Lj.exe
          Source: aISbFyk4Lj.exe, 00000000.00000002.227522713.0000000003698000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll( vs aISbFyk4Lj.exe
          Source: aISbFyk4Lj.exe, 00000000.00000002.231733663.0000000006710000.00000002.00000001.sdmpBinary or memory string: originalfilename vs aISbFyk4Lj.exe
          Source: aISbFyk4Lj.exe, 00000000.00000002.231733663.0000000006710000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs aISbFyk4Lj.exe
          Source: aISbFyk4Lj.exe, 00000000.00000002.230861005.00000000057F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dllj% vs aISbFyk4Lj.exe
          Source: aISbFyk4Lj.exe, 00000000.00000002.231565418.0000000006620000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs aISbFyk4Lj.exe
          Source: aISbFyk4Lj.exe, 00000000.00000002.230866914.0000000005800000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dll.muij% vs aISbFyk4Lj.exe
          Source: aISbFyk4Lj.exeBinary or memory string: OriginalFilenamegetClaimsd95.exeF vs aISbFyk4Lj.exe
          Source: aISbFyk4Lj.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 00000000.00000002.227998353.00000000045E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000000.00000002.227998353.00000000045E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.aISbFyk4Lj.exe.484a9b8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.aISbFyk4Lj.exe.484a9b8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.aISbFyk4Lj.exe.484a9b8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.aISbFyk4Lj.exe.484a9b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.aISbFyk4Lj.exe.484a9b8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: aISbFyk4Lj.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: QxHKzIlUxTf.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal100.troj.evad.winEXE@8/5@15/1
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_0597143A AdjustTokenPrivileges,
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_05971403 AdjustTokenPrivileges,
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeFile created: C:\Users\user\AppData\Roaming\QxHKzIlUxTf.exeJump to behavior
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeMutant created: \Sessions\1\BaseNamedObjects\LiNEoHrmAt
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5232:120:WilError_01
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{a7fa722b-7dae-45b1-afa6-302155a56210}
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8EF.tmpJump to behavior
          Source: aISbFyk4Lj.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
          Source: aISbFyk4Lj.exeVirustotal: Detection: 23%
          Source: aISbFyk4Lj.exeReversingLabs: Detection: 27%
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeFile read: C:\Users\user\Desktop\aISbFyk4Lj.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\aISbFyk4Lj.exe 'C:\Users\user\Desktop\aISbFyk4Lj.exe'
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QxHKzIlUxTf' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EF.tmp'
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QxHKzIlUxTf' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EF.tmp'
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
          Source: aISbFyk4Lj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: aISbFyk4Lj.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: aISbFyk4Lj.exeStatic file information: File size 1476608 > 1048576
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
          Source: aISbFyk4Lj.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x14d800
          Source: aISbFyk4Lj.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: aISbFyk4Lj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\aJUqyHKjYG\src\obj\Debug\getClaimsd95.pdbT source: aISbFyk4Lj.exe
          Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\aJUqyHKjYG\src\obj\Debug\getClaimsd95.pdb source: aISbFyk4Lj.exe
          Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: RegSvcs.exe, 00000004.00000003.370702724.0000000000AF9000.00000004.00000001.sdmp
          Source: Binary string: mscorrc.pdb source: aISbFyk4Lj.exe, 00000000.00000002.230993463.0000000005880000.00000002.00000001.sdmp
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C9838 push dword ptr [eax-67h]; ret
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_057C842C push esp; iretd
          Source: initial sampleStatic PE information: section name: .text entropy: 7.93424696113
          Source: initial sampleStatic PE information: section name: .text entropy: 7.93424696113
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeFile created: C:\Users\user\AppData\Roaming\QxHKzIlUxTf.exeJump to dropped file

          Boot Survival:

          barindex
          Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QxHKzIlUxTf' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EF.tmp'

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe:Zone.Identifier read attributes | delete
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: aISbFyk4Lj.exe PID: 3288, type: MEMORY
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindow / User API: threadDelayed 649
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindow / User API: foregroundWindowGot 645
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindow / User API: foregroundWindowGot 734
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exe TID: 3704Thread sleep time: -103557s >= -30000s
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exe TID: 3508Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeThread delayed: delay time: 103557
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: aISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Allocates memory in foreign processesShow sources
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 protect: page execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 value starts with: 4D5A
          Writes to foreign memory regionsShow sources
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 402000
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 420000
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 422000
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 664008
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QxHKzIlUxTf' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EF.tmp'
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
          Source: RegSvcs.exe, 00000004.00000003.295080067.0000000000ABB000.00000004.00000001.sdmpBinary or memory string: Program Manager
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeCode function: 0_2_018FB0BE GetUserNameW,
          Source: C:\Users\user\Desktop\aISbFyk4Lj.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000000.00000002.227998353.00000000045E1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0.2.aISbFyk4Lj.exe.484a9b8.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.aISbFyk4Lj.exe.484a9b8.2.raw.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000000.00000002.227998353.00000000045E1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0.2.aISbFyk4Lj.exe.484a9b8.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.aISbFyk4Lj.exe.484a9b8.2.raw.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsScheduled Task/Job1Scheduled Task/Job1Access Token Manipulation1Masquerading1OS Credential DumpingSecurity Software Discovery211Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection312Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection312LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information3DCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing2Proc FilesystemSystem Information Discovery2Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          aISbFyk4Lj.exe24%VirustotalBrowse
          aISbFyk4Lj.exe28%ReversingLabsWin32.Trojan.Wacatac
          aISbFyk4Lj.exe100%Joe Sandbox ML

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\QxHKzIlUxTf.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\QxHKzIlUxTf.exe28%ReversingLabsWin32.Trojan.Wacatac

          Unpacked PE Files

          No Antivirus matches

          Domains

          SourceDetectionScannerLabelLink
          wespeaktruthtoman.sytes.net8%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          http://checkip.dyndns.org/0%VirustotalBrowse
          http://checkip.dyndns.org/0%Avira URL Cloudsafe
          wespeaktruthtoman.sytes.net8%VirustotalBrowse
          wespeaktruthtoman.sytes.net0%Avira URL Cloudsafe
          http://servermanager.miixit.org/hits/hit_index.php?k=10%Avira URL Cloudsafe
          wespeaktruthtoman12.sytes.net0%Avira URL Cloudsafe
          http://servermanager.miixit.org/E0%Avira URL Cloudsafe
          http://servermanager.miixit.org/index_ru.html0%Avira URL Cloudsafe
          http://servermanager.miixit.org/report/reporter_index.php?name=0%Avira URL Cloudsafe
          http://servermanager.miixit.org/0%Avira URL Cloudsafe
          http://servermanager.miixit.org/index_ru.htmlk0%Avira URL Cloudsafe
          http://servermanager.miixit.org/downloads/0%Avira URL Cloudsafe
          http://servermanager.miixit.org/hits/hit_index.php?k=0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          wespeaktruthtoman.sytes.net
          105.112.208.19
          truetrueunknown
          wespeaktruthtoman12.sytes.net
          unknown
          unknowntrue
            unknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            wespeaktruthtoman.sytes.nettrue
            • 8%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            wespeaktruthtoman12.sytes.nettrue
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://checkip.dyndns.org/aISbFyk4Lj.exefalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://servermanager.miixit.org/hits/hit_index.php?k=1aISbFyk4Lj.exefalse
            • Avira URL Cloud: safe
            unknown
            https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CJU3DBQXBUQPCaISbFyk4Lj.exefalse
              high
              http://servermanager.miixit.org/EaISbFyk4Lj.exefalse
              • Avira URL Cloud: safe
              unknown
              http://servermanager.miixit.org/index_ru.htmlaISbFyk4Lj.exefalse
              • Avira URL Cloud: safe
              unknown
              http://servermanager.miixit.org/report/reporter_index.php?name=aISbFyk4Lj.exefalse
              • Avira URL Cloud: safe
              unknown
              http://servermanager.miixit.org/aISbFyk4Lj.exefalse
              • Avira URL Cloud: safe
              unknown
              http://servermanager.miixit.org/index_ru.htmlkaISbFyk4Lj.exefalse
              • Avira URL Cloud: safe
              unknown
              https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssaISbFyk4Lj.exe, 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmpfalse
                high
                http://servermanager.miixit.org/downloads/aISbFyk4Lj.exefalse
                • Avira URL Cloud: safe
                unknown
                http://servermanager.miixit.org/hits/hit_index.php?k=aISbFyk4Lj.exefalse
                • Avira URL Cloud: safe
                unknown

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                105.112.208.19
                wespeaktruthtoman.sytes.netNigeria
                36873VNL1-ASNGtrue

                General Information

                Joe Sandbox Version:32.0.0 Black Diamond
                Analysis ID:412223
                Start date:12.05.2021
                Start time:14:09:05
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 8m 0s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:aISbFyk4Lj.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:17
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@8/5@15/1
                EGA Information:Failed
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 90%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .exe
                Warnings:
                Show All
                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                • Excluded IPs from analysis (whitelisted): 168.61.161.212, 52.147.198.201, 13.88.21.125, 184.30.20.56, 2.20.143.16, 2.20.142.209
                • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, fs.microsoft.com, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, skypedataprdcoleus16.cloudapp.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus15.cloudapp.net, au-bg-shim.trafficmanager.net
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                14:10:00API Interceptor1x Sleep call for process: aISbFyk4Lj.exe modified
                14:10:05API Interceptor967x Sleep call for process: RegSvcs.exe modified

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                wespeaktruthtoman.sytes.netcXyHZtgrFS.exeGet hashmaliciousBrowse
                • 79.134.225.47
                13efMb6ayq.exeGet hashmaliciousBrowse
                • 79.134.225.47
                s65eJyjKga.exeGet hashmaliciousBrowse
                • 79.134.225.47
                new order.xlsxGet hashmaliciousBrowse
                • 79.134.225.47
                Ot3srIM10B.exeGet hashmaliciousBrowse
                • 79.134.225.47
                kwK4iGa9DL.exeGet hashmaliciousBrowse
                • 79.134.225.47
                4z9Saf2vu3.exeGet hashmaliciousBrowse
                • 79.134.225.47
                ORDER 4553241.xlsxGet hashmaliciousBrowse
                • 105.112.101.86
                Pu5UMH4fWK.exeGet hashmaliciousBrowse
                • 79.134.225.14

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                VNL1-ASNGw85rzxid7y.exeGet hashmaliciousBrowse
                • 105.112.102.199
                ORDER 4553241.xlsxGet hashmaliciousBrowse
                • 105.112.101.86
                akclienttues.exeGet hashmaliciousBrowse
                • 105.112.53.147
                Spec_PDF.vbsGet hashmaliciousBrowse
                • 105.112.11.245
                6GCAm7DuOd.exeGet hashmaliciousBrowse
                • 105.112.36.184
                Scan.Invoice0909206606.exeGet hashmaliciousBrowse
                • 105.112.39.176
                kYXjS6Oc3S.exeGet hashmaliciousBrowse
                • 105.112.99.190
                eK1KiJlz3l.exeGet hashmaliciousBrowse
                • 105.112.99.190
                80tzo8FG3d.exeGet hashmaliciousBrowse
                • 105.112.98.238
                Stub.exeGet hashmaliciousBrowse
                • 105.112.78.3
                nyrXbOodFH.exeGet hashmaliciousBrowse
                • 105.112.37.156
                3aDHivUqWtumbXb.exeGet hashmaliciousBrowse
                • 105.112.99.199
                ld7EYHHTT6.exeGet hashmaliciousBrowse
                • 105.112.148.62
                SecuriteInfo.com.Variant.Bulz.394792.29952.exeGet hashmaliciousBrowse
                • 105.112.98.171
                SecuriteInfo.com.Trojan.PackedNET.578.18498.exeGet hashmaliciousBrowse
                • 105.112.98.171
                yPLbA6JwCR.exeGet hashmaliciousBrowse
                • 105.112.156.57
                m1UDslBq6j.exeGet hashmaliciousBrowse
                • 105.112.107.123
                hjCQmeI243.exeGet hashmaliciousBrowse
                • 105.112.36.173
                Ixli7b5j6A.exeGet hashmaliciousBrowse
                • 105.112.106.26
                Ircg423Akc.exeGet hashmaliciousBrowse
                • 105.112.97.251

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\aISbFyk4Lj.exe.log
                Process:C:\Users\user\Desktop\aISbFyk4Lj.exe
                File Type:ASCII text, with CRLF line terminators
                Category:modified
                Size (bytes):916
                Entropy (8bit):5.282390836641403
                Encrypted:false
                SSDEEP:24:MLF20NaL3z2p29hJ5g522rW2xAi3AP26K95rKoO2+g2+:MwLLD2Y9h3go2rxxAcAO6ox+g2+
                MD5:5AD8E7ABEADADAC4CE06FF693476581A
                SHA1:81E42A97BBE3D7DE8B1E8B54C2B03C48594D761E
                SHA-256:BAA1A28262BA27D51C3A1FA7FB0811AD1128297ABB2EDCCC785DC52667D2A6FD
                SHA-512:7793E78E84AD36CE65B5B1C015364E340FB9110FAF199BC0234108CE9BCB1AEDACBD25C6A012AC99740E08BEA5E5C373A88E553E47016304D8AE6AEEAB58EBFF
                Malicious:true
                Reputation:moderate, very likely benign file
                Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\35774dc3cd31b4550ab06c3354cf4ba5\System.Runtime.Remoting.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\de460308a9099237864d2ec2328fc958\System.Configuration.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\527c933194f3a99a816d83c619a3e1d3\System.Xml.ni.dll",0..
                C:\Users\user\AppData\Local\Temp\tmp8EF.tmp
                Process:C:\Users\user\Desktop\aISbFyk4Lj.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1644
                Entropy (8bit):5.1944478973860955
                Encrypted:false
                SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBPtn:cbh47TlNQ//rydbz9I3YODOLNdq3n
                MD5:E38027EBC37002B1FE092464B6C50B95
                SHA1:69AA7795D3B11A6A00287E52B32922D8E709A90E
                SHA-256:1E9883662C67947499313FE57C066D600B86E342D05E38D3BBCA11D18057178B
                SHA-512:510EA110A11A2FCC43DEC5D7949AF1D521DE0E90312F9B85A2F599368670357D100D5F581E76B6345458E44DFA02094A3F9A604F755743199DBF63AFDBA5E1ED
                Malicious:true
                Reputation:low
                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                File Type:International EBCDIC text, with NEL line terminators
                Category:dropped
                Size (bytes):8
                Entropy (8bit):3.0
                Encrypted:false
                SSDEEP:3:KlN:KT
                MD5:E53DF14406EA51F6AD5310C94FEA9653
                SHA1:5BD800A65855F236146D932FBD4770D50E73F469
                SHA-256:5B4ECA88318B72851EFEE98C61006C852B7F468802C1D12D6B4FB0E611BEEA49
                SHA-512:BF9F3C5062392F727ACA1E3B1A277131F840AAAA6E398F16E6C8A717BA04D1B72296B92E9662EBAB399807BEF7C2A0F02024231BF306FDA4BA0D33F00A3BBD54
                Malicious:true
                Reputation:low
                Preview: ..P...H
                C:\Users\user\AppData\Roaming\QxHKzIlUxTf.exe
                Process:C:\Users\user\Desktop\aISbFyk4Lj.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):1476608
                Entropy (8bit):7.772479880770275
                Encrypted:false
                SSDEEP:24576:MvI4jwLI3Z/kneMTMoiKc4MUVLUFJ6VAsqbuQjrFQLIrH:MAa3Z/keMs5UUwWsqb/jr5
                MD5:167F0A829DF709CC4107369ED23FBDFB
                SHA1:A66CAACF3BD0390912AB789B7E773E805172BA4C
                SHA-256:12279E26650D5826758AE344BC6FFEF54A438D4782A42F0D369403AE41F3914B
                SHA-512:BFE66CD5BE80F3912041B504BF20A05EFE510C7ABB3CB653E03E1F25F5CF193BA5338A007A688C718A6AE97F51886C020ABB853A39A020DA7C880AA81C4C7E23
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 28%
                Reputation:low
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P.............~.... ........@.. ....................................@.................................,...O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................`.......H.......pr..,...............X............................................0............(....(..........(.....o ....*.....................(!......("......(#......($......(%....*N..(....o....(&....*&..('....*.s(........s)........s*........s+........s,........*....0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0..<........~.....(2.....,!r...p.....(3...o4...s5............~.....+..*.0......
                C:\Users\user\AppData\Roaming\QxHKzIlUxTf.exe:Zone.Identifier
                Process:C:\Users\user\Desktop\aISbFyk4Lj.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):26
                Entropy (8bit):3.95006375643621
                Encrypted:false
                SSDEEP:3:ggPYV:rPYV
                MD5:187F488E27DB4AF347237FE461A079AD
                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                Malicious:true
                Reputation:high, very likely benign file
                Preview: [ZoneTransfer]....ZoneId=0

                Static File Info

                General

                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.772479880770275
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                • Win32 Executable (generic) a (10002005/4) 49.78%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                File name:aISbFyk4Lj.exe
                File size:1476608
                MD5:167f0a829df709cc4107369ed23fbdfb
                SHA1:a66caacf3bd0390912ab789b7e773e805172ba4c
                SHA256:12279e26650d5826758ae344bc6ffef54a438d4782a42f0d369403ae41f3914b
                SHA512:bfe66cd5be80f3912041b504bf20a05efe510c7abb3cb653e03e1f25f5cf193ba5338a007a688c718a6ae97f51886c020abb853a39a020da7c880aa81c4c7e23
                SSDEEP:24576:MvI4jwLI3Z/kneMTMoiKc4MUVLUFJ6VAsqbuQjrFQLIrH:MAa3Z/keMs5UUwWsqb/jr5
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P.............~.... ........@.. ....................................@................................

                File Icon

                Icon Hash:cc92316d713396e8

                Static PE Info

                General

                Entrypoint:0x54f67e
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Time Stamp:0x609BBDAF [Wed May 12 11:36:15 2021 UTC]
                TLS Callbacks:
                CLR (.Net) Version:v2.0.50727
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                Entrypoint Preview

                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al

                Data Directories

                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x14f62c0x4f.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1500000x1abb0.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x16c0000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x14f4f40x1c.text
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                Sections

                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x14d6840x14d800False0.937049053598data7.93424696113IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .rsrc0x1500000x1abb00x1ac00False0.146274459696data3.15106465863IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x16c0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                Resources

                NameRVASizeTypeLanguageCountry
                RT_ICON0x1502500x468GLS_BINARY_LSB_FIRST
                RT_ICON0x1506b80x162aPNG image data, 256 x 256, 8-bit colormap, non-interlaced
                RT_ICON0x151ce40x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                RT_ICON0x15428c0x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                RT_ICON0x1553340x10828dBase III DBT, version number 0, next free block index 40
                RT_ICON0x165b5c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                RT_GROUP_ICON0x169d840x5adata
                RT_GROUP_ICON0x169de00x14data
                RT_VERSION0x169df40x354data
                RT_MANIFEST0x16a1480xa65XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                Imports

                DLLImport
                mscoree.dll_CorExeMain

                Version Infos

                DescriptionData
                Translation0x0000 0x04b0
                LegalCopyrightCopyright 2013
                Assembly Version3.0.0.0
                InternalNamegetClaimsd95.exe
                FileVersion3.0.0.0
                CompanyName
                LegalTrademarks
                Comments
                ProductNameServerManager_Core
                ProductVersion3.0.0.0
                FileDescriptionServerManager_Core
                OriginalFilenamegetClaimsd95.exe

                Network Behavior

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                May 12, 2021 14:10:07.926372051 CEST496945600192.168.2.3105.112.208.19
                May 12, 2021 14:10:10.927815914 CEST496945600192.168.2.3105.112.208.19
                May 12, 2021 14:10:16.928287029 CEST496945600192.168.2.3105.112.208.19
                May 12, 2021 14:10:27.812267065 CEST497055600192.168.2.3105.112.208.19
                May 12, 2021 14:10:30.820108891 CEST497055600192.168.2.3105.112.208.19
                May 12, 2021 14:10:36.867598057 CEST497055600192.168.2.3105.112.208.19
                May 12, 2021 14:10:47.904078007 CEST497065600192.168.2.3105.112.208.19
                May 12, 2021 14:10:50.899920940 CEST497065600192.168.2.3105.112.208.19
                May 12, 2021 14:10:57.072427034 CEST497065600192.168.2.3105.112.208.19
                May 12, 2021 14:11:22.187241077 CEST497085600192.168.2.3105.112.208.19
                May 12, 2021 14:11:25.199759007 CEST497085600192.168.2.3105.112.208.19
                May 12, 2021 14:11:31.200397968 CEST497085600192.168.2.3105.112.208.19
                May 12, 2021 14:11:40.734610081 CEST497095600192.168.2.3105.112.208.19
                May 12, 2021 14:11:43.748296976 CEST497095600192.168.2.3105.112.208.19
                May 12, 2021 14:11:49.764352083 CEST497095600192.168.2.3105.112.208.19
                May 12, 2021 14:11:57.417399883 CEST497105600192.168.2.3105.112.208.19
                May 12, 2021 14:12:00.421408892 CEST497105600192.168.2.3105.112.208.19
                May 12, 2021 14:12:06.422015905 CEST497105600192.168.2.3105.112.208.19

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                May 12, 2021 14:09:52.197921038 CEST5696153192.168.2.38.8.8.8
                May 12, 2021 14:09:52.249525070 CEST53569618.8.8.8192.168.2.3
                May 12, 2021 14:09:53.094300985 CEST5935353192.168.2.38.8.8.8
                May 12, 2021 14:09:53.151433945 CEST53593538.8.8.8192.168.2.3
                May 12, 2021 14:09:54.402956009 CEST5223853192.168.2.38.8.8.8
                May 12, 2021 14:09:54.454456091 CEST53522388.8.8.8192.168.2.3
                May 12, 2021 14:09:55.308458090 CEST4987353192.168.2.38.8.8.8
                May 12, 2021 14:09:55.362652063 CEST53498738.8.8.8192.168.2.3
                May 12, 2021 14:10:01.325623035 CEST5319653192.168.2.38.8.8.8
                May 12, 2021 14:10:01.377830982 CEST53531968.8.8.8192.168.2.3
                May 12, 2021 14:10:02.353259087 CEST5677753192.168.2.38.8.8.8
                May 12, 2021 14:10:02.402128935 CEST53567778.8.8.8192.168.2.3
                May 12, 2021 14:10:04.487103939 CEST5864353192.168.2.38.8.8.8
                May 12, 2021 14:10:04.538048983 CEST53586438.8.8.8192.168.2.3
                May 12, 2021 14:10:05.972115040 CEST6098553192.168.2.38.8.8.8
                May 12, 2021 14:10:06.020780087 CEST53609858.8.8.8192.168.2.3
                May 12, 2021 14:10:06.890644073 CEST5020053192.168.2.38.8.8.8
                May 12, 2021 14:10:06.939263105 CEST53502008.8.8.8192.168.2.3
                May 12, 2021 14:10:07.797035933 CEST5128153192.168.2.38.8.8.8
                May 12, 2021 14:10:07.856506109 CEST53512818.8.8.8192.168.2.3
                May 12, 2021 14:10:08.141349077 CEST4919953192.168.2.38.8.8.8
                May 12, 2021 14:10:08.191653967 CEST53491998.8.8.8192.168.2.3
                May 12, 2021 14:10:08.925841093 CEST5062053192.168.2.38.8.8.8
                May 12, 2021 14:10:08.977776051 CEST53506208.8.8.8192.168.2.3
                May 12, 2021 14:10:09.719042063 CEST6493853192.168.2.38.8.8.8
                May 12, 2021 14:10:09.769270897 CEST53649388.8.8.8192.168.2.3
                May 12, 2021 14:10:10.492587090 CEST6015253192.168.2.38.8.8.8
                May 12, 2021 14:10:10.541302919 CEST53601528.8.8.8192.168.2.3
                May 12, 2021 14:10:11.335540056 CEST5754453192.168.2.38.8.8.8
                May 12, 2021 14:10:11.395431995 CEST53575448.8.8.8192.168.2.3
                May 12, 2021 14:10:12.158965111 CEST5598453192.168.2.38.8.8.8
                May 12, 2021 14:10:12.220136881 CEST53559848.8.8.8192.168.2.3
                May 12, 2021 14:10:13.261647940 CEST6418553192.168.2.38.8.8.8
                May 12, 2021 14:10:13.311885118 CEST53641858.8.8.8192.168.2.3
                May 12, 2021 14:10:22.907243967 CEST6511053192.168.2.38.8.8.8
                May 12, 2021 14:10:22.969291925 CEST53651108.8.8.8192.168.2.3
                May 12, 2021 14:10:27.748070955 CEST5836153192.168.2.38.8.8.8
                May 12, 2021 14:10:27.810220003 CEST53583618.8.8.8192.168.2.3
                May 12, 2021 14:10:47.850631952 CEST6349253192.168.2.38.8.8.8
                May 12, 2021 14:10:47.862081051 CEST6083153192.168.2.38.8.8.8
                May 12, 2021 14:10:47.902456999 CEST53634928.8.8.8192.168.2.3
                May 12, 2021 14:10:47.922029972 CEST53608318.8.8.8192.168.2.3
                May 12, 2021 14:11:07.928497076 CEST6010053192.168.2.38.8.8.8
                May 12, 2021 14:11:07.985506058 CEST53601008.8.8.8192.168.2.3
                May 12, 2021 14:11:08.167423010 CEST5319553192.168.2.38.8.4.4
                May 12, 2021 14:11:08.228714943 CEST53531958.8.4.4192.168.2.3
                May 12, 2021 14:11:08.287180901 CEST5014153192.168.2.38.8.8.8
                May 12, 2021 14:11:08.348562002 CEST53501418.8.8.8192.168.2.3
                May 12, 2021 14:11:12.555984974 CEST5302353192.168.2.38.8.8.8
                May 12, 2021 14:11:12.613117933 CEST53530238.8.8.8192.168.2.3
                May 12, 2021 14:11:13.215193987 CEST4956353192.168.2.38.8.4.4
                May 12, 2021 14:11:13.272510052 CEST53495638.8.4.4192.168.2.3
                May 12, 2021 14:11:13.365533113 CEST5135253192.168.2.38.8.8.8
                May 12, 2021 14:11:13.422804117 CEST53513528.8.8.8192.168.2.3
                May 12, 2021 14:11:17.661933899 CEST5934953192.168.2.38.8.8.8
                May 12, 2021 14:11:17.719084978 CEST53593498.8.8.8192.168.2.3
                May 12, 2021 14:11:17.753895044 CEST5708453192.168.2.38.8.4.4
                May 12, 2021 14:11:17.815638065 CEST53570848.8.4.4192.168.2.3
                May 12, 2021 14:11:17.981719017 CEST5882353192.168.2.38.8.8.8
                May 12, 2021 14:11:18.042107105 CEST53588238.8.8.8192.168.2.3
                May 12, 2021 14:11:22.121907949 CEST5756853192.168.2.38.8.8.8
                May 12, 2021 14:11:22.185769081 CEST53575688.8.8.8192.168.2.3
                May 12, 2021 14:11:40.674099922 CEST5054053192.168.2.38.8.8.8
                May 12, 2021 14:11:40.733225107 CEST53505408.8.8.8192.168.2.3
                May 12, 2021 14:11:57.362112999 CEST5436653192.168.2.38.8.8.8
                May 12, 2021 14:11:57.415962934 CEST53543668.8.8.8192.168.2.3

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                May 12, 2021 14:10:07.797035933 CEST192.168.2.38.8.8.80xee82Standard query (0)wespeaktruthtoman.sytes.netA (IP address)IN (0x0001)
                May 12, 2021 14:10:27.748070955 CEST192.168.2.38.8.8.80x9d3cStandard query (0)wespeaktruthtoman.sytes.netA (IP address)IN (0x0001)
                May 12, 2021 14:10:47.850631952 CEST192.168.2.38.8.8.80xb13bStandard query (0)wespeaktruthtoman.sytes.netA (IP address)IN (0x0001)
                May 12, 2021 14:11:07.928497076 CEST192.168.2.38.8.8.80x187eStandard query (0)wespeaktruthtoman12.sytes.netA (IP address)IN (0x0001)
                May 12, 2021 14:11:08.167423010 CEST192.168.2.38.8.4.40x7021Standard query (0)wespeaktruthtoman12.sytes.netA (IP address)IN (0x0001)
                May 12, 2021 14:11:08.287180901 CEST192.168.2.38.8.8.80x8e6aStandard query (0)wespeaktruthtoman12.sytes.netA (IP address)IN (0x0001)
                May 12, 2021 14:11:12.555984974 CEST192.168.2.38.8.8.80xd0aeStandard query (0)wespeaktruthtoman12.sytes.netA (IP address)IN (0x0001)
                May 12, 2021 14:11:13.215193987 CEST192.168.2.38.8.4.40x4bf6Standard query (0)wespeaktruthtoman12.sytes.netA (IP address)IN (0x0001)
                May 12, 2021 14:11:13.365533113 CEST192.168.2.38.8.8.80x757bStandard query (0)wespeaktruthtoman12.sytes.netA (IP address)IN (0x0001)
                May 12, 2021 14:11:17.661933899 CEST192.168.2.38.8.8.80xca1aStandard query (0)wespeaktruthtoman12.sytes.netA (IP address)IN (0x0001)
                May 12, 2021 14:11:17.753895044 CEST192.168.2.38.8.4.40xa13fStandard query (0)wespeaktruthtoman12.sytes.netA (IP address)IN (0x0001)
                May 12, 2021 14:11:17.981719017 CEST192.168.2.38.8.8.80xa420Standard query (0)wespeaktruthtoman12.sytes.netA (IP address)IN (0x0001)
                May 12, 2021 14:11:22.121907949 CEST192.168.2.38.8.8.80x6731Standard query (0)wespeaktruthtoman.sytes.netA (IP address)IN (0x0001)
                May 12, 2021 14:11:40.674099922 CEST192.168.2.38.8.8.80x3e28Standard query (0)wespeaktruthtoman.sytes.netA (IP address)IN (0x0001)
                May 12, 2021 14:11:57.362112999 CEST192.168.2.38.8.8.80x4eb1Standard query (0)wespeaktruthtoman.sytes.netA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                May 12, 2021 14:10:07.856506109 CEST8.8.8.8192.168.2.30xee82No error (0)wespeaktruthtoman.sytes.net105.112.208.19A (IP address)IN (0x0001)
                May 12, 2021 14:10:27.810220003 CEST8.8.8.8192.168.2.30x9d3cNo error (0)wespeaktruthtoman.sytes.net105.112.208.19A (IP address)IN (0x0001)
                May 12, 2021 14:10:47.902456999 CEST8.8.8.8192.168.2.30xb13bNo error (0)wespeaktruthtoman.sytes.net105.112.208.19A (IP address)IN (0x0001)
                May 12, 2021 14:11:22.185769081 CEST8.8.8.8192.168.2.30x6731No error (0)wespeaktruthtoman.sytes.net105.112.208.19A (IP address)IN (0x0001)
                May 12, 2021 14:11:40.733225107 CEST8.8.8.8192.168.2.30x3e28No error (0)wespeaktruthtoman.sytes.net105.112.208.19A (IP address)IN (0x0001)
                May 12, 2021 14:11:57.415962934 CEST8.8.8.8192.168.2.30x4eb1No error (0)wespeaktruthtoman.sytes.net105.112.208.19A (IP address)IN (0x0001)

                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:14:09:59
                Start date:12/05/2021
                Path:C:\Users\user\Desktop\aISbFyk4Lj.exe
                Wow64 process (32bit):true
                Commandline:'C:\Users\user\Desktop\aISbFyk4Lj.exe'
                Imagebase:0xec0000
                File size:1476608 bytes
                MD5 hash:167F0A829DF709CC4107369ED23FBDFB
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.227476170.000000000362D000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.227998353.00000000045E1000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.227998353.00000000045E1000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.227998353.00000000045E1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                Reputation:low

                General

                Start time:14:10:02
                Start date:12/05/2021
                Path:C:\Windows\SysWOW64\schtasks.exe
                Wow64 process (32bit):true
                Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QxHKzIlUxTf' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EF.tmp'
                Imagebase:0xc70000
                File size:185856 bytes
                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:14:10:02
                Start date:12/05/2021
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6b2800000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:14:10:03
                Start date:12/05/2021
                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                Imagebase:0x1e0000
                File size:32768 bytes
                MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate

                General

                Start time:14:10:03
                Start date:12/05/2021
                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                Imagebase:0x4d0000
                File size:32768 bytes
                MD5 hash:71369277D09DA0830C8C59F9E22BB23A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Reputation:moderate

                Disassembly

                Code Analysis

                Reset < >