Loading ...

Play interactive tourEdit tour

Analysis Report QuotationOrder.pdf.exe

Overview

General Information

Sample Name:QuotationOrder.pdf.exe
Analysis ID:412361
MD5:14e431bcb3fdb77cd13912a5cbef9e40
SHA1:717c23d8bd639b9e22e2de994ef8ef87f575b48c
SHA256:378932d5fc866bfe3ae59abe125e21da19ae9fd819976fd1fdd73f8fce110b7e
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected AntiVM3
Yara detected Nanocore RAT
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • QuotationOrder.pdf.exe (PID: 6248 cmdline: 'C:\Users\user\Desktop\QuotationOrder.pdf.exe' MD5: 14E431BCB3FDB77CD13912A5CBEF9E40)
    • schtasks.exe (PID: 6348 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RLaczhWDn' /XML 'C:\Users\user\AppData\Local\Temp\tmpAF14.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • MSBuild.exe (PID: 6400 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: D621FD77BD585874F9686D3A76462EF1)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "7d9d1b37-9225-4679-a6f4-60db74de", "Group": "TBOSS1", "Domain1": "194.5.98.19", "Domain2": "tboss1.ddns.net", "Port": 53795, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.243826185.00000000043B9000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xc5065:$x1: NanoCore.ClientPluginHost
  • 0xc50a2:$x2: IClientNetworkHost
  • 0xc8bd5:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000000.00000002.243826185.00000000043B9000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.243826185.00000000043B9000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xc4dcd:$a: NanoCore
    • 0xc4ddd:$a: NanoCore
    • 0xc5011:$a: NanoCore
    • 0xc5025:$a: NanoCore
    • 0xc5065:$a: NanoCore
    • 0xc4e2c:$b: ClientPlugin
    • 0xc502e:$b: ClientPlugin
    • 0xc506e:$b: ClientPlugin
    • 0xc4f53:$c: ProjectData
    • 0xc595a:$d: DESCrypto
    • 0xcd326:$e: KeepAlive
    • 0xcb314:$g: LogClientMessage
    • 0xc750f:$i: get_Connected
    • 0xc5c90:$j: #=q
    • 0xc5cc0:$j: #=q
    • 0xc5cdc:$j: #=q
    • 0xc5d0c:$j: #=q
    • 0xc5d28:$j: #=q
    • 0xc5d44:$j: #=q
    • 0xc5d74:$j: #=q
    • 0xc5d90:$j: #=q
    00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x14844d:$x1: NanoCore.ClientPluginHost
    • 0x14848a:$x2: IClientNetworkHost
    • 0x14bfbd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 6 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      0.2.QuotationOrder.pdf.exe.446ded8.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe38d:$x1: NanoCore.ClientPluginHost
      • 0xe3ca:$x2: IClientNetworkHost
      • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      0.2.QuotationOrder.pdf.exe.446ded8.3.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe105:$x1: NanoCore Client.exe
      • 0xe38d:$x2: NanoCore.ClientPluginHost
      • 0xf9c6:$s1: PluginCommand
      • 0xf9ba:$s2: FileCommand
      • 0x1086b:$s3: PipeExists
      • 0x16622:$s4: PipeCreated
      • 0xe3b7:$s5: IClientLoggingHost
      0.2.QuotationOrder.pdf.exe.446ded8.3.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        0.2.QuotationOrder.pdf.exe.446ded8.3.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xe0f5:$a: NanoCore
        • 0xe105:$a: NanoCore
        • 0xe339:$a: NanoCore
        • 0xe34d:$a: NanoCore
        • 0xe38d:$a: NanoCore
        • 0xe154:$b: ClientPlugin
        • 0xe356:$b: ClientPlugin
        • 0xe396:$b: ClientPlugin
        • 0xe27b:$c: ProjectData
        • 0xec82:$d: DESCrypto
        • 0x1664e:$e: KeepAlive
        • 0x1463c:$g: LogClientMessage
        • 0x10837:$i: get_Connected
        • 0xefb8:$j: #=q
        • 0xefe8:$j: #=q
        • 0xf004:$j: #=q
        • 0xf034:$j: #=q
        • 0xf050:$j: #=q
        • 0xf06c:$j: #=q
        • 0xf09c:$j: #=q
        • 0xf0b8:$j: #=q
        0.2.QuotationOrder.pdf.exe.446ded8.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0x1018d:$x1: NanoCore.ClientPluginHost
        • 0x101ca:$x2: IClientNetworkHost
        • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        Click to see the 3 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 6400, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 6400, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        System Summary:

        barindex
        Sigma detected: Possible Applocker BypassShow sources
        Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ParentCommandLine: 'C:\Users\user\Desktop\QuotationOrder.pdf.exe' , ParentImage: C:\Users\user\Desktop\QuotationOrder.pdf.exe, ParentProcessId: 6248, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 6400

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 6400, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 6400, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 0.2.QuotationOrder.pdf.exe.446ded8.3.raw.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "7d9d1b37-9225-4679-a6f4-60db74de", "Group": "TBOSS1", "Domain1": "194.5.98.19", "Domain2": "tboss1.ddns.net", "Port": 53795, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\RLaczhWDn.exeReversingLabs: Detection: 12%
        Multi AV Scanner detection for submitted fileShow sources
        Source: QuotationOrder.pdf.exeReversingLabs: Detection: 12%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.243826185.00000000043B9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: QuotationOrder.pdf.exe PID: 6248, type: MEMORY
        Source: Yara matchFile source: 0.2.QuotationOrder.pdf.exe.446ded8.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.QuotationOrder.pdf.exe.446ded8.3.raw.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\RLaczhWDn.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: QuotationOrder.pdf.exeJoe Sandbox ML: detected
        Source: QuotationOrder.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: QuotationOrder.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: q.pdB source: QuotationOrder.pdf.exe, 00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmp

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: tboss1.ddns.net
        Source: Malware configuration extractorURLs: 194.5.98.19
        Source: global trafficTCP traffic: 192.168.2.7:49705 -> 194.5.98.19:53795
        Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.8
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.19
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243492551.00000000033B1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49677
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49686
        Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49683
        Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49683 -> 443
        Source: QuotationOrder.pdf.exe, 00000000.00000002.242937271.0000000001598000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.243826185.00000000043B9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: QuotationOrder.pdf.exe PID: 6248, type: MEMORY
        Source: Yara matchFile source: 0.2.QuotationOrder.pdf.exe.446ded8.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.QuotationOrder.pdf.exe.446ded8.3.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000000.00000002.243826185.00000000043B9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.243826185.00000000043B9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: QuotationOrder.pdf.exe PID: 6248, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: QuotationOrder.pdf.exe PID: 6248, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.QuotationOrder.pdf.exe.446ded8.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.QuotationOrder.pdf.exe.446ded8.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.QuotationOrder.pdf.exe.446ded8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.QuotationOrder.pdf.exe.446ded8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: QuotationOrder.pdf.exe
        Source: initial sampleStatic PE information: Filename: QuotationOrder.pdf.exe
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_018199D8
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03264918
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_032641D0
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_032660CD
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03267717
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03264FD0
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03263E28
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03265E78
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03265A61
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03265A70
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03266134
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03264908
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_032641C2
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03260006
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03267843
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03260040
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03264FC0
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03263E18
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03265E68
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03263C50
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_0588DAB0
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_0588B760
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_0588B770
        Source: QuotationOrder.pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: RLaczhWDn.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: QuotationOrder.pdf.exe, 00000000.00000002.247694872.000000000C1E0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs QuotationOrder.pdf.exe
        Source: QuotationOrder.pdf.exe, 00000000.00000003.233367638.0000000001642000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWaitHandle.exeP vs QuotationOrder.pdf.exe
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs QuotationOrder.pdf.exe
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243492551.00000000033B1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll( vs QuotationOrder.pdf.exe
        Source: QuotationOrder.pdf.exe, 00000000.00000002.247916879.000000000C2E0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs QuotationOrder.pdf.exe
        Source: QuotationOrder.pdf.exe, 00000000.00000002.247916879.000000000C2E0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs QuotationOrder.pdf.exe
        Source: QuotationOrder.pdf.exeBinary or memory string: OriginalFilenameWaitHandle.exeP vs QuotationOrder.pdf.exe
        Source: QuotationOrder.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000000.00000002.243826185.00000000043B9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.243826185.00000000043B9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: QuotationOrder.pdf.exe PID: 6248, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: QuotationOrder.pdf.exe PID: 6248, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.QuotationOrder.pdf.exe.446ded8.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.QuotationOrder.pdf.exe.446ded8.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.QuotationOrder.pdf.exe.446ded8.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.QuotationOrder.pdf.exe.446ded8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.QuotationOrder.pdf.exe.446ded8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.QuotationOrder.pdf.exe.446ded8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: QuotationOrder.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: RLaczhWDn.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.evad.winEXE@6/8@0/1
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeFile created: C:\Users\user\AppData\Roaming\RLaczhWDn.exeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{7d9d1b37-9225-4679-a6f4-60db74de0410}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6356:120:WilError_01
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\LKKjbTstsW
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmpAF14.tmpJump to behavior
        Source: QuotationOrder.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
        Source: QuotationOrder.pdf.exeReversingLabs: Detection: 12%
        Source: QuotationOrder.pdf.exeString found in binary or memory: ^(Male|Female)$-Add Student Details :-
        Source: QuotationOrder.pdf.exeString found in binary or memory: Teacher Name-Add Teacher Details :-
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeFile read: C:\Users\user\Desktop\QuotationOrder.pdf.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\QuotationOrder.pdf.exe 'C:\Users\user\Desktop\QuotationOrder.pdf.exe'
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RLaczhWDn' /XML 'C:\Users\user\AppData\Local\Temp\tmpAF14.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RLaczhWDn' /XML 'C:\Users\user\AppData\Local\Temp\tmpAF14.tmp'
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: QuotationOrder.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: QuotationOrder.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: q.pdB source: QuotationOrder.pdf.exe, 00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmp
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03263380 push ebx; retf
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03263922 push ebx; iretd
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeCode function: 0_2_03263918 push ebx; iretd
        Source: initial sampleStatic PE information: section name: .text entropy: 7.65733353837
        Source: initial sampleStatic PE information: section name: .text entropy: 7.65733353837
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeFile created: C:\Users\user\AppData\Roaming\RLaczhWDn.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RLaczhWDn' /XML 'C:\Users\user\AppData\Local\Temp\tmpAF14.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Uses an obfuscated file name to hide its real file extension (double extension)Show sources
        Source: Possible double extension: pdf.exeStatic PE information: QuotationOrder.pdf.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: QuotationOrder.pdf.exe PID: 6248, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 4920
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 4766
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: foregroundWindowGot 739
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: foregroundWindowGot 626
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exe TID: 6252Thread sleep time: -104892s >= -30000s
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exe TID: 6408Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6496Thread sleep time: -18446744073709540s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeThread delayed: delay time: 104892
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
        Source: MSBuild.exe, 00000003.00000003.290304771.0000000001437000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll3cP
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess token adjusted: Debug
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Allocates memory in foreign processesShow sources
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and write
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5A
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 420000
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 422000
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: F3A008
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RLaczhWDn' /XML 'C:\Users\user\AppData\Local\Temp\tmpAF14.tmp'
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeQueries volume information: C:\Users\user\Desktop\QuotationOrder.pdf.exe VolumeInformation
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Users\user\Desktop\QuotationOrder.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.243826185.00000000043B9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: QuotationOrder.pdf.exe PID: 6248, type: MEMORY
        Source: Yara matchFile source: 0.2.QuotationOrder.pdf.exe.446ded8.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.QuotationOrder.pdf.exe.446ded8.3.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: QuotationOrder.pdf.exe, 00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: MSBuild.exe, 00000003.00000003.264054732.000000000145D000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.243826185.00000000043B9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: QuotationOrder.pdf.exe PID: 6248, type: MEMORY
        Source: Yara matchFile source: 0.2.QuotationOrder.pdf.exe.446ded8.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.QuotationOrder.pdf.exe.446ded8.3.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Process Injection311Masquerading11Input Capture1Query Registry1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsCommand and Scripting Interpreter2Boot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemorySecurity Software Discovery221Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsScheduled Task/Job1Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection311NTDSVirtualization/Sandbox Evasion31Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information12LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing2Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery12Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        QuotationOrder.pdf.exe13%ReversingLabsWin32.Trojan.Wacatac
        QuotationOrder.pdf.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\RLaczhWDn.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\RLaczhWDn.exe13%ReversingLabsWin32.Trojan.Wacatac

        Unpacked PE Files

        No Antivirus matches

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        tboss1.ddns.net0%Avira URL Cloudsafe
        194.5.98.190%VirustotalBrowse
        194.5.98.190%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        No contacted domains info

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        tboss1.ddns.nettrue
        • Avira URL Cloud: safe
        unknown
        194.5.98.19true
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameQuotationOrder.pdf.exe, 00000000.00000002.243492551.00000000033B1000.00000004.00000001.sdmpfalse
          high
          https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssQuotationOrder.pdf.exe, 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmpfalse
            high

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            194.5.98.19
            unknownNetherlands
            208476DANILENKODEtrue

            General Information

            Joe Sandbox Version:32.0.0 Black Diamond
            Analysis ID:412361
            Start date:12.05.2021
            Start time:16:37:08
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 8m 9s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:QuotationOrder.pdf.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:30
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@6/8@0/1
            EGA Information:Failed
            HDC Information:Failed
            HCA Information:
            • Successful, ratio: 99%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            Warnings:
            Show All
            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
            • TCP Packets have been reduced to 100
            • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200, 20.82.209.183, 104.43.139.144, 40.88.32.150, 92.122.145.220, 184.30.20.56, 2.20.143.16, 2.20.142.209, 52.155.217.156, 20.54.26.129, 92.122.213.194, 92.122.213.247
            • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, dual-a-0001.dc-msedge.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            16:37:58API Interceptor2x Sleep call for process: QuotationOrder.pdf.exe modified

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            194.5.98.19http://saggepaylive.co/Receipt of BACS payment 20092018.jarGet hashmaliciousBrowse
              https://fellasconstrltd.co.ukGet hashmaliciousBrowse
                https://www.aeroart.com.au/wp-admin/remittance.jarGet hashmaliciousBrowse
                  remittance.jarGet hashmaliciousBrowse

                    Domains

                    No context

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    DANILENKODEQuotation.jarGet hashmaliciousBrowse
                    • 194.5.98.38
                    Quotation.jarGet hashmaliciousBrowse
                    • 194.5.98.38
                    47755769_by_Libranalysis.exeGet hashmaliciousBrowse
                    • 194.5.98.210
                    Contract_kyrgyzstan_pdf.exeGet hashmaliciousBrowse
                    • 194.5.98.203
                    y3t4g48gj6_PAYMENT.exeGet hashmaliciousBrowse
                    • 194.5.97.75
                    y3t4g48gj6_PAYMENT.exeGet hashmaliciousBrowse
                    • 194.5.97.75
                    Quotation.jarGet hashmaliciousBrowse
                    • 194.5.98.38
                    5lQuLT5Zu8.exeGet hashmaliciousBrowse
                    • 194.5.97.116
                    IPUt7Nr2CH.exeGet hashmaliciousBrowse
                    • 194.5.97.75
                    Passport_ID_jpg.jarGet hashmaliciousBrowse
                    • 194.5.98.228
                    Vd80r7R7K5.exeGet hashmaliciousBrowse
                    • 194.5.98.208
                    noVPhNP46G.exeGet hashmaliciousBrowse
                    • 194.5.98.208
                    LQ0dDP64uk.exeGet hashmaliciousBrowse
                    • 194.5.98.208
                    SCAN_DOCX-36673672.exeGet hashmaliciousBrowse
                    • 194.5.97.11
                    4b092c1e_by_Libranalysis.docxGet hashmaliciousBrowse
                    • 194.5.98.208
                    QW8lWJDpU8.exeGet hashmaliciousBrowse
                    • 194.5.98.5
                    2a8f04dd_by_Libranalysis.docmGet hashmaliciousBrowse
                    • 194.5.98.210
                    Invoice_orderYscFwfO1peuGl0w.exeGet hashmaliciousBrowse
                    • 194.5.98.250
                    Quotation.jarGet hashmaliciousBrowse
                    • 194.5.97.87
                    Quotation.jarGet hashmaliciousBrowse
                    • 194.5.97.87

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\QuotationOrder.pdf.exe.log
                    Process:C:\Users\user\Desktop\QuotationOrder.pdf.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):1314
                    Entropy (8bit):5.350128552078965
                    Encrypted:false
                    SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                    MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                    SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                    SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                    SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                    C:\Users\user\AppData\Local\Temp\tmpAF14.tmp
                    Process:C:\Users\user\Desktop\QuotationOrder.pdf.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1658
                    Entropy (8bit):5.172758791574188
                    Encrypted:false
                    SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBIItn:cbhH7MlNQ8/rydbz9I3YODOLNdq3Cu
                    MD5:B79D81932ABEC23FDC88F5174005E22B
                    SHA1:8AD532699EFB3ABDB0C9C8CE6AB813D3A8E61A43
                    SHA-256:AAD7A31CC58EE7586719F33F84442BC343F68268E17B57F9925819FE2C5C954D
                    SHA-512:2D5FEB2DFB7A5F739781017063E37FC36FC1FA1B9CD0938B5207D7A4D2621F9DD14D2EC9A1EDB6FE106CC7309075621133C8DB4A49A8AA4B2E4497D61FD6C5EA
                    Malicious:true
                    Reputation:low
                    Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):232
                    Entropy (8bit):7.024371743172393
                    Encrypted:false
                    SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                    MD5:32D0AAE13696FF7F8AF33B2D22451028
                    SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                    SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                    SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):8
                    Entropy (8bit):3.0
                    Encrypted:false
                    SSDEEP:3:f:f
                    MD5:98FFEE1BE6A389DA995E26874A8902A7
                    SHA1:6A9A6943232179F45B37AB51E3424DAB9F229281
                    SHA-256:0D6B2577E2F9D323C9632D28ED41AC91DBBE5FC476A0FAAADEA9BDA4685EF368
                    SHA-512:8ED324A779482DD98B6D35C4873D0C2421E034BC53A6E8AC7301ED35C27A3A49D6E5DCFF65EE966300E29F29FA55B1A778C44D6D2BE0F3388E308390EF5CF753
                    Malicious:true
                    Reputation:low
                    Preview: .:.....H
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):40
                    Entropy (8bit):5.153055907333276
                    Encrypted:false
                    SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                    MD5:4E5E92E2369688041CC82EF9650EDED2
                    SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                    SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                    SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):327432
                    Entropy (8bit):7.99938831605763
                    Encrypted:true
                    SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                    MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                    SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                    SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                    SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                    Malicious:false
                    Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                    C:\Users\user\AppData\Roaming\RLaczhWDn.exe
                    Process:C:\Users\user\Desktop\QuotationOrder.pdf.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):850944
                    Entropy (8bit):7.33046471356557
                    Encrypted:false
                    SSDEEP:24576:CHqaISNYHhszddtBr+8qqbGdxP9rm0JU0:2vZuAddtyi8P/
                    MD5:14E431BCB3FDB77CD13912A5CBEF9E40
                    SHA1:717C23D8BD639B9E22E2DE994EF8EF87F575B48C
                    SHA-256:378932D5FC866BFE3AE59ABE125E21DA19AE9FD819976FD1FDD73F8FCE110B7E
                    SHA-512:2E8A8B5117F1680C30A3F8234BA2944BE4543F94EA7753720087C839F45901296ACD2072A3EBBC18292882015ABF8790B86B000FEAECAFB3452E074713927671
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 13%
                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....`..............P..L...........k... ........@.. .......................`............@..................................k..O.......<....................@....................................................... ............... ..H............text....K... ...L.................. ..`.rsrc...<............N..............@..@.reloc.......@......................@..B.................k......H...........8...........0...X............................................0............( ...(!.........(.....o"....*.....................(#......($......(%......(&......('....*N..(....oS...((....*&..()....*.s*........s+........s,........s-........s.........*....0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0...........~....o2....+..*.0...........~....o3....+..*.0..<........~.....(4.....,!r...p.....(5...o6...s7............~.....+..*.0......
                    C:\Users\user\AppData\Roaming\RLaczhWDn.exe:Zone.Identifier
                    Process:C:\Users\user\Desktop\QuotationOrder.pdf.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Preview: [ZoneTransfer]....ZoneId=0

                    Static File Info

                    General

                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):7.33046471356557
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    • Win32 Executable (generic) a (10002005/4) 49.78%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:QuotationOrder.pdf.exe
                    File size:850944
                    MD5:14e431bcb3fdb77cd13912a5cbef9e40
                    SHA1:717c23d8bd639b9e22e2de994ef8ef87f575b48c
                    SHA256:378932d5fc866bfe3ae59abe125e21da19ae9fd819976fd1fdd73f8fce110b7e
                    SHA512:2e8a8b5117f1680c30a3f8234ba2944be4543f94ea7753720087c839f45901296acd2072a3ebbc18292882015abf8790b86b000feaecafb3452e074713927671
                    SSDEEP:24576:CHqaISNYHhszddtBr+8qqbGdxP9rm0JU0:2vZuAddtyi8P/
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P..L...........k... ........@.. .......................`............@................................

                    File Icon

                    Icon Hash:cc92316d713396e8

                    Static PE Info

                    General

                    Entrypoint:0x4b6bda
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Time Stamp:0x609BD296 [Wed May 12 13:05:26 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:v4.0.30319
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                    Entrypoint Preview

                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al

                    Data Directories

                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xb6b880x4f.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xb80000x1ab3c.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xd40000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                    Sections

                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000xb4be00xb4c00False0.811643650588data7.65733353837IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    .rsrc0xb80000x1ab3c0x1ac00False0.145973276869data3.15479172029IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0xd40000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                    Resources

                    NameRVASizeTypeLanguageCountry
                    RT_ICON0xb82200x468GLS_BINARY_LSB_FIRST
                    RT_ICON0xb86880x162aPNG image data, 256 x 256, 8-bit colormap, non-interlaced
                    RT_ICON0xb9cb40x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                    RT_ICON0xbc25c0x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                    RT_ICON0xbd3040x10828dBase III DBT, version number 0, next free block index 40
                    RT_ICON0xcdb2c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                    RT_GROUP_ICON0xd1d540x5adata
                    RT_VERSION0xd1db00x35cdata
                    RT_MANIFEST0xd210c0xa2eXML 1.0 document, UTF-8 Unicode (with BOM) text

                    Imports

                    DLLImport
                    mscoree.dll_CorExeMain

                    Version Infos

                    DescriptionData
                    Translation0x0000 0x04b0
                    LegalCopyrightCopyright 2020
                    Assembly Version1.0.0.0
                    InternalNameWaitHandle.exe
                    FileVersion1.0.0.0
                    CompanyName
                    LegalTrademarks
                    Comments
                    ProductNameLibraryManagementSystem
                    ProductVersion1.0.0.0
                    FileDescriptionLibraryManagementSystem
                    OriginalFilenameWaitHandle.exe

                    Network Behavior

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    May 12, 2021 16:37:49.402602911 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.402625084 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.402640104 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.402653933 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.402666092 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.402678967 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.402692080 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.402704954 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.402720928 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.402798891 CEST49683443192.168.2.720.190.160.8
                    May 12, 2021 16:37:49.406750917 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.406775951 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.437081099 CEST49683443192.168.2.720.190.160.8
                    May 12, 2021 16:37:49.437128067 CEST49683443192.168.2.720.190.160.8
                    May 12, 2021 16:37:49.446013927 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.484226942 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.484262943 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.558038950 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.558084965 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.558279991 CEST49686443192.168.2.720.190.160.8
                    May 12, 2021 16:37:49.572079897 CEST49686443192.168.2.720.190.160.8
                    May 12, 2021 16:37:49.572144985 CEST49686443192.168.2.720.190.160.8
                    May 12, 2021 16:37:49.626034021 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.628714085 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.637880087 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.637937069 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.637986898 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.638031960 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.638073921 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.638114929 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.638154030 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.638170004 CEST49683443192.168.2.720.190.160.8
                    May 12, 2021 16:37:49.638189077 CEST49683443192.168.2.720.190.160.8
                    May 12, 2021 16:37:49.638194084 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.638233900 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.638350010 CEST49683443192.168.2.720.190.160.8
                    May 12, 2021 16:37:49.638359070 CEST49683443192.168.2.720.190.160.8
                    May 12, 2021 16:37:49.793132067 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.793154955 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.793168068 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.793185949 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.793205976 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.793225050 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.793241024 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.793256998 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.793276072 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.793291092 CEST49686443192.168.2.720.190.160.8
                    May 12, 2021 16:37:49.793385983 CEST49686443192.168.2.720.190.160.8
                    May 12, 2021 16:37:49.859034061 CEST49683443192.168.2.720.190.160.8
                    May 12, 2021 16:37:49.859078884 CEST49683443192.168.2.720.190.160.8
                    May 12, 2021 16:37:49.860367060 CEST49686443192.168.2.720.190.160.8
                    May 12, 2021 16:37:49.860460043 CEST49686443192.168.2.720.190.160.8
                    May 12, 2021 16:37:49.906537056 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.906565905 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.913742065 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.913774014 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:49.948044062 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.065779924 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.065824986 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.065845013 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.065871000 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.065895081 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.065918922 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.065943003 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.065967083 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.065989971 CEST4434968320.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.066137075 CEST49683443192.168.2.720.190.160.8
                    May 12, 2021 16:37:50.066188097 CEST49683443192.168.2.720.190.160.8
                    May 12, 2021 16:37:50.069802999 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.069839001 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.069864988 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.069890022 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.069915056 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.069942951 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.069960117 CEST49686443192.168.2.720.190.160.8
                    May 12, 2021 16:37:50.069969893 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.069998026 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.070005894 CEST49686443192.168.2.720.190.160.8
                    May 12, 2021 16:37:50.070022106 CEST4434968620.190.160.8192.168.2.7
                    May 12, 2021 16:37:50.070054054 CEST49686443192.168.2.720.190.160.8
                    May 12, 2021 16:37:50.125252962 CEST49686443192.168.2.720.190.160.8
                    May 12, 2021 16:38:04.338349104 CEST4970553795192.168.2.7194.5.98.19
                    May 12, 2021 16:38:04.625350952 CEST5379549705194.5.98.19192.168.2.7
                    May 12, 2021 16:38:04.626024008 CEST4970553795192.168.2.7194.5.98.19
                    May 12, 2021 16:38:04.663634062 CEST4970553795192.168.2.7194.5.98.19
                    May 12, 2021 16:38:05.025593996 CEST5379549705194.5.98.19192.168.2.7
                    May 12, 2021 16:38:05.025703907 CEST4970553795192.168.2.7194.5.98.19
                    May 12, 2021 16:38:05.673342943 CEST5379549705194.5.98.19192.168.2.7
                    May 12, 2021 16:38:05.673434973 CEST4970553795192.168.2.7194.5.98.19
                    May 12, 2021 16:38:06.131752968 CEST5379549705194.5.98.19192.168.2.7
                    May 12, 2021 16:38:06.208240986 CEST4970553795192.168.2.7194.5.98.19
                    May 12, 2021 16:38:06.847779989 CEST5379549705194.5.98.19192.168.2.7
                    May 12, 2021 16:38:06.854868889 CEST5379549705194.5.98.19192.168.2.7
                    May 12, 2021 16:38:06.857724905 CEST4970553795192.168.2.7194.5.98.19
                    May 12, 2021 16:38:07.400722980 CEST5379549705194.5.98.19192.168.2.7
                    May 12, 2021 16:38:07.450665951 CEST5379549705194.5.98.19192.168.2.7
                    May 12, 2021 16:38:07.450900078 CEST4970553795192.168.2.7194.5.98.19
                    May 12, 2021 16:38:07.463649035 CEST5379549705194.5.98.19192.168.2.7
                    May 12, 2021 16:38:07.492629051 CEST5379549705194.5.98.19192.168.2.7
                    May 12, 2021 16:38:07.493413925 CEST4970553795192.168.2.7194.5.98.19

                    UDP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    May 12, 2021 16:37:50.136571884 CEST5782053192.168.2.78.8.8.8
                    May 12, 2021 16:37:50.197191000 CEST53578208.8.8.8192.168.2.7
                    May 12, 2021 16:37:50.305509090 CEST5084853192.168.2.78.8.8.8
                    May 12, 2021 16:37:50.364871979 CEST53508488.8.8.8192.168.2.7
                    May 12, 2021 16:37:50.436470032 CEST6124253192.168.2.78.8.8.8
                    May 12, 2021 16:37:50.496620893 CEST53612428.8.8.8192.168.2.7
                    May 12, 2021 16:37:51.380249977 CEST5856253192.168.2.78.8.8.8
                    May 12, 2021 16:37:51.430921078 CEST53585628.8.8.8192.168.2.7
                    May 12, 2021 16:37:52.520164967 CEST5659053192.168.2.78.8.8.8
                    May 12, 2021 16:37:52.578984022 CEST53565908.8.8.8192.168.2.7
                    May 12, 2021 16:37:53.069900036 CEST6050153192.168.2.78.8.8.8
                    May 12, 2021 16:37:53.121454954 CEST53605018.8.8.8192.168.2.7
                    May 12, 2021 16:37:55.749366999 CEST5377553192.168.2.78.8.8.8
                    May 12, 2021 16:37:55.802941084 CEST53537758.8.8.8192.168.2.7
                    May 12, 2021 16:37:56.546875954 CEST5183753192.168.2.78.8.8.8
                    May 12, 2021 16:37:56.598454952 CEST53518378.8.8.8192.168.2.7
                    May 12, 2021 16:37:57.524034977 CEST5541153192.168.2.78.8.8.8
                    May 12, 2021 16:37:57.572818995 CEST53554118.8.8.8192.168.2.7
                    May 12, 2021 16:37:59.112962961 CEST6366853192.168.2.78.8.8.8
                    May 12, 2021 16:37:59.161858082 CEST53636688.8.8.8192.168.2.7
                    May 12, 2021 16:38:00.298413992 CEST5464053192.168.2.78.8.8.8
                    May 12, 2021 16:38:00.347196102 CEST53546408.8.8.8192.168.2.7
                    May 12, 2021 16:38:01.534859896 CEST5873953192.168.2.78.8.8.8
                    May 12, 2021 16:38:01.586709976 CEST53587398.8.8.8192.168.2.7
                    May 12, 2021 16:38:02.570036888 CEST6033853192.168.2.78.8.8.8
                    May 12, 2021 16:38:02.620176077 CEST53603388.8.8.8192.168.2.7
                    May 12, 2021 16:38:03.501022100 CEST5871753192.168.2.78.8.8.8
                    May 12, 2021 16:38:03.550889015 CEST53587178.8.8.8192.168.2.7
                    May 12, 2021 16:38:04.529175997 CEST5976253192.168.2.78.8.8.8
                    May 12, 2021 16:38:04.580795050 CEST53597628.8.8.8192.168.2.7
                    May 12, 2021 16:38:05.407155037 CEST5432953192.168.2.78.8.8.8
                    May 12, 2021 16:38:05.456099987 CEST53543298.8.8.8192.168.2.7
                    May 12, 2021 16:38:06.186273098 CEST5805253192.168.2.78.8.8.8
                    May 12, 2021 16:38:06.237843037 CEST53580528.8.8.8192.168.2.7
                    May 12, 2021 16:38:07.044519901 CEST5400853192.168.2.78.8.8.8
                    May 12, 2021 16:38:07.093291998 CEST53540088.8.8.8192.168.2.7
                    May 12, 2021 16:38:07.847956896 CEST5945153192.168.2.78.8.8.8
                    May 12, 2021 16:38:07.896676064 CEST53594518.8.8.8192.168.2.7
                    May 12, 2021 16:38:08.874038935 CEST5291453192.168.2.78.8.8.8
                    May 12, 2021 16:38:08.923909903 CEST53529148.8.8.8192.168.2.7
                    May 12, 2021 16:38:09.832998991 CEST6456953192.168.2.78.8.8.8
                    May 12, 2021 16:38:09.881685972 CEST53645698.8.8.8192.168.2.7
                    May 12, 2021 16:38:10.754215002 CEST5281653192.168.2.78.8.8.8
                    May 12, 2021 16:38:10.803047895 CEST53528168.8.8.8192.168.2.7
                    May 12, 2021 16:38:13.429421902 CEST5078153192.168.2.78.8.8.8
                    May 12, 2021 16:38:13.478338003 CEST53507818.8.8.8192.168.2.7
                    May 12, 2021 16:38:15.326056004 CEST5423053192.168.2.78.8.8.8
                    May 12, 2021 16:38:15.375394106 CEST53542308.8.8.8192.168.2.7
                    May 12, 2021 16:38:15.911966085 CEST5491153192.168.2.78.8.8.8
                    May 12, 2021 16:38:15.971407890 CEST53549118.8.8.8192.168.2.7
                    May 12, 2021 16:38:34.968208075 CEST4995853192.168.2.78.8.8.8
                    May 12, 2021 16:38:35.025798082 CEST53499588.8.8.8192.168.2.7
                    May 12, 2021 16:38:46.392949104 CEST5086053192.168.2.78.8.8.8
                    May 12, 2021 16:38:46.450272083 CEST53508608.8.8.8192.168.2.7
                    May 12, 2021 16:38:46.549272060 CEST5045253192.168.2.78.8.8.8
                    May 12, 2021 16:38:46.606832027 CEST53504528.8.8.8192.168.2.7
                    May 12, 2021 16:39:01.538760900 CEST5973053192.168.2.78.8.8.8
                    May 12, 2021 16:39:01.595906973 CEST53597308.8.8.8192.168.2.7
                    May 12, 2021 16:39:02.271943092 CEST5931053192.168.2.78.8.8.8
                    May 12, 2021 16:39:02.332194090 CEST53593108.8.8.8192.168.2.7
                    May 12, 2021 16:39:02.778215885 CEST5191953192.168.2.78.8.8.8
                    May 12, 2021 16:39:02.851145029 CEST53519198.8.8.8192.168.2.7
                    May 12, 2021 16:39:02.960926056 CEST6429653192.168.2.78.8.8.8
                    May 12, 2021 16:39:03.020271063 CEST53642968.8.8.8192.168.2.7
                    May 12, 2021 16:39:03.496707916 CEST5668053192.168.2.78.8.8.8
                    May 12, 2021 16:39:03.546567917 CEST53566808.8.8.8192.168.2.7
                    May 12, 2021 16:39:04.136363029 CEST5882053192.168.2.78.8.8.8
                    May 12, 2021 16:39:04.196341991 CEST53588208.8.8.8192.168.2.7
                    May 12, 2021 16:39:05.036043882 CEST6098353192.168.2.78.8.8.8
                    May 12, 2021 16:39:05.084620953 CEST53609838.8.8.8192.168.2.7
                    May 12, 2021 16:39:05.593821049 CEST4924753192.168.2.78.8.8.8
                    May 12, 2021 16:39:05.642579079 CEST53492478.8.8.8192.168.2.7
                    May 12, 2021 16:39:06.537549973 CEST5228653192.168.2.78.8.8.8
                    May 12, 2021 16:39:06.597774029 CEST53522868.8.8.8192.168.2.7
                    May 12, 2021 16:39:07.591264963 CEST5606453192.168.2.78.8.8.8
                    May 12, 2021 16:39:07.644853115 CEST53560648.8.8.8192.168.2.7
                    May 12, 2021 16:39:08.113748074 CEST6374453192.168.2.78.8.8.8
                    May 12, 2021 16:39:08.174438953 CEST53637448.8.8.8192.168.2.7
                    May 12, 2021 16:39:19.232753038 CEST6145753192.168.2.78.8.8.8
                    May 12, 2021 16:39:19.293617964 CEST53614578.8.8.8192.168.2.7
                    May 12, 2021 16:39:47.435106039 CEST5836753192.168.2.78.8.8.8
                    May 12, 2021 16:39:47.515708923 CEST53583678.8.8.8192.168.2.7
                    May 12, 2021 16:39:48.874694109 CEST6059953192.168.2.78.8.8.8
                    May 12, 2021 16:39:48.931833029 CEST53605998.8.8.8192.168.2.7

                    Code Manipulations

                    Statistics

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:16:37:56
                    Start date:12/05/2021
                    Path:C:\Users\user\Desktop\QuotationOrder.pdf.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Users\user\Desktop\QuotationOrder.pdf.exe'
                    Imagebase:0xf20000
                    File size:850944 bytes
                    MD5 hash:14E431BCB3FDB77CD13912A5CBEF9E40
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.243826185.00000000043B9000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.243826185.00000000043B9000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.243826185.00000000043B9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.243971939.0000000004508000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.243530638.00000000033F4000.00000004.00000001.sdmp, Author: Joe Security
                    Reputation:low

                    General

                    Start time:16:38:00
                    Start date:12/05/2021
                    Path:C:\Windows\SysWOW64\schtasks.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RLaczhWDn' /XML 'C:\Users\user\AppData\Local\Temp\tmpAF14.tmp'
                    Imagebase:0xef0000
                    File size:185856 bytes
                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:16:38:00
                    Start date:12/05/2021
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff774ee0000
                    File size:625664 bytes
                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:16:38:01
                    Start date:12/05/2021
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    Imagebase:0xd20000
                    File size:261728 bytes
                    MD5 hash:D621FD77BD585874F9686D3A76462EF1
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Reputation:moderate

                    Disassembly

                    Code Analysis

                    Reset < >