Loading ...

Play interactive tourEdit tour

Analysis Report kyIfnzzg3E.exe

Overview

General Information

Sample Name:kyIfnzzg3E.exe
Analysis ID:431751
MD5:eb43b3c033bd76b51b90a51a6726a81c
SHA1:0d39ffcf64ed4f38ea83a72d726d40881f583014
SHA256:4e9a5cc90f1d17550208942e0182e9a99598c18c19b3467c184a46f4214755e2
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Creates an undocumented autostart registry key
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Suspicious Process Start Without DLL
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Antivirus or Machine Learning detection for unpacked file
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • kyIfnzzg3E.exe (PID: 5860 cmdline: 'C:\Users\user\Desktop\kyIfnzzg3E.exe' MD5: EB43B3C033BD76B51B90A51A6726A81C)
    • RegAsm.exe (PID: 3636 cmdline: C:\Users\user\AppData\Local\Temp\RegAsm.exe MD5: 6FD7592411112729BF6B1F2F6C34899F)
    • RegAsm.exe (PID: 4276 cmdline: C:\Users\user\AppData\Local\Temp\RegAsm.exe MD5: 6FD7592411112729BF6B1F2F6C34899F)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "4614bd42-26c0-4da0-8e09-16890d37", "Group": "Default", "Domain1": "wekeepworking.sytes.net", "Domain2": "wekeepworking12.sytes.net", "Port": 1144, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
kyIfnzzg3E.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\win33.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

      Memory Dumps

      SourceRuleDescriptionAuthorStrings
      00000000.00000002.250699387.00000000001D2000.00000002.00020000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000007.00000002.461789098.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xff8d:$x1: NanoCore.ClientPluginHost
        • 0xffca:$x2: IClientNetworkHost
        • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        00000007.00000002.461789098.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          00000007.00000002.461789098.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
          • 0xfcf5:$a: NanoCore
          • 0xfd05:$a: NanoCore
          • 0xff39:$a: NanoCore
          • 0xff4d:$a: NanoCore
          • 0xff8d:$a: NanoCore
          • 0xfd54:$b: ClientPlugin
          • 0xff56:$b: ClientPlugin
          • 0xff96:$b: ClientPlugin
          • 0xfe7b:$c: ProjectData
          • 0x10882:$d: DESCrypto
          • 0x1824e:$e: KeepAlive
          • 0x1623c:$g: LogClientMessage
          • 0x12437:$i: get_Connected
          • 0x10bb8:$j: #=q
          • 0x10be8:$j: #=q
          • 0x10c04:$j: #=q
          • 0x10c34:$j: #=q
          • 0x10c50:$j: #=q
          • 0x10c6c:$j: #=q
          • 0x10c9c:$j: #=q
          • 0x10cb8:$j: #=q
          00000000.00000002.251456849.0000000002561000.00000004.00000001.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            Click to see the 20 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            7.0.RegAsm.exe.400000.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
            • 0x1018d:$x1: NanoCore.ClientPluginHost
            • 0x101ca:$x2: IClientNetworkHost
            • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
            7.0.RegAsm.exe.400000.3.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
            • 0xff05:$x1: NanoCore Client.exe
            • 0x1018d:$x2: NanoCore.ClientPluginHost
            • 0x117c6:$s1: PluginCommand
            • 0x117ba:$s2: FileCommand
            • 0x1266b:$s3: PipeExists
            • 0x18422:$s4: PipeCreated
            • 0x101b7:$s5: IClientLoggingHost
            7.0.RegAsm.exe.400000.3.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
              7.0.RegAsm.exe.400000.3.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
              • 0xfef5:$a: NanoCore
              • 0xff05:$a: NanoCore
              • 0x10139:$a: NanoCore
              • 0x1014d:$a: NanoCore
              • 0x1018d:$a: NanoCore
              • 0xff54:$b: ClientPlugin
              • 0x10156:$b: ClientPlugin
              • 0x10196:$b: ClientPlugin
              • 0x1007b:$c: ProjectData
              • 0x10a82:$d: DESCrypto
              • 0x1844e:$e: KeepAlive
              • 0x1643c:$g: LogClientMessage
              • 0x12637:$i: get_Connected
              • 0x10db8:$j: #=q
              • 0x10de8:$j: #=q
              • 0x10e04:$j: #=q
              • 0x10e34:$j: #=q
              • 0x10e50:$j: #=q
              • 0x10e6c:$j: #=q
              • 0x10e9c:$j: #=q
              • 0x10eb8:$j: #=q
              0.0.kyIfnzzg3E.exe.1d0000.0.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                Click to see the 39 entries

                Sigma Overview

                AV Detection:

                barindex
                Sigma detected: NanoCoreShow sources
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 4276, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

                E-Banking Fraud:

                barindex
                Sigma detected: NanoCoreShow sources
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 4276, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

                System Summary:

                barindex
                Sigma detected: Suspicious Process Start Without DLLShow sources
                Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\user\AppData\Local\Temp\RegAsm.exe, CommandLine: C:\Users\user\AppData\Local\Temp\RegAsm.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\RegAsm.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ParentCommandLine: 'C:\Users\user\Desktop\kyIfnzzg3E.exe' , ParentImage: C:\Users\user\Desktop\kyIfnzzg3E.exe, ParentProcessId: 5860, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 3636
                Sigma detected: Possible Applocker BypassShow sources
                Source: Process startedAuthor: juju4: Data: Command: C:\Users\user\AppData\Local\Temp\RegAsm.exe, CommandLine: C:\Users\user\AppData\Local\Temp\RegAsm.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\RegAsm.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ParentCommandLine: 'C:\Users\user\Desktop\kyIfnzzg3E.exe' , ParentImage: C:\Users\user\Desktop\kyIfnzzg3E.exe, ParentProcessId: 5860, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 3636

                Stealing of Sensitive Information:

                barindex
                Sigma detected: NanoCoreShow sources
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 4276, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

                Remote Access Functionality:

                barindex
                Sigma detected: NanoCoreShow sources
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 4276, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

                Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: 7.0.RegAsm.exe.400000.3.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "4614bd42-26c0-4da0-8e09-16890d37", "Group": "Default", "Domain1": "wekeepworking.sytes.net", "Domain2": "wekeepworking12.sytes.net", "Port": 1144, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
                Multi AV Scanner detection for domain / URLShow sources
                Source: wekeepworking.sytes.netVirustotal: Detection: 7%Perma Link
                Source: wekeepworking.sytes.netVirustotal: Detection: 7%Perma Link
                Multi AV Scanner detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Roaming\win33.exeReversingLabs: Detection: 30%
                Multi AV Scanner detection for submitted fileShow sources
                Source: kyIfnzzg3E.exeVirustotal: Detection: 39%Perma Link
                Source: kyIfnzzg3E.exeReversingLabs: Detection: 30%
                Yara detected Nanocore RATShow sources
                Source: Yara matchFile source: 00000007.00000002.461789098.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000000.249612191.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.252649732.00000000037D6000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000000.249317743.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.251887619.0000000003645000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.251765887.0000000003561000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4276, type: MEMORY
                Source: Yara matchFile source: 7.0.RegAsm.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.36e6e20.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.3736e40.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.36bee00.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.0.RegAsm.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.38d7c88.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.3736e40.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.38d7c88.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.36bee00.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.36e6e20.3.raw.unpack, type: UNPACKEDPE
                Machine Learning detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Roaming\win33.exeJoe Sandbox ML: detected
                Machine Learning detection for sampleShow sources
                Source: kyIfnzzg3E.exeJoe Sandbox ML: detected
                Source: 7.0.RegAsm.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
                Source: 7.0.RegAsm.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
                Source: 7.2.RegAsm.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
                Source: kyIfnzzg3E.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                Source: kyIfnzzg3E.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: RegAsm.pdb source: RegAsm.exe, RegAsm.exe.0.dr
                Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000005.00000000.247162877.00000000000A2000.00000002.00020000.sdmp, RegAsm.exe, 00000007.00000000.249672602.0000000000BF2000.00000002.00020000.sdmp, RegAsm.exe.0.dr
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 4x nop then mov dword ptr [ebp-20h], 7FFFFFFFh
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 4x nop then jmp 04DD614Fh
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h

                Networking:

                barindex
                C2 URLs / IPs found in malware configurationShow sources
                Source: Malware configuration extractorURLs: wekeepworking.sytes.net
                Source: Malware configuration extractorURLs: wekeepworking12.sytes.net
                Source: global trafficTCP traffic: 192.168.2.3:49722 -> 79.134.225.90:1144
                Source: Joe Sandbox ViewIP Address: 79.134.225.90 79.134.225.90
                Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
                Source: unknownDNS traffic detected: queries for: wekeepworking.sytes.net

                E-Banking Fraud:

                barindex
                Yara detected Nanocore RATShow sources
                Source: Yara matchFile source: 00000007.00000002.461789098.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000000.249612191.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.252649732.00000000037D6000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000000.249317743.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.251887619.0000000003645000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.251765887.0000000003561000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4276, type: MEMORY
                Source: Yara matchFile source: 7.0.RegAsm.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.36e6e20.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.3736e40.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.36bee00.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.0.RegAsm.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.38d7c88.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.3736e40.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.38d7c88.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.36bee00.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.36e6e20.3.raw.unpack, type: UNPACKEDPE

                System Summary:

                barindex
                Malicious sample detected (through community Yara rule)Show sources
                Source: 00000007.00000002.461789098.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 00000007.00000002.461789098.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 00000007.00000000.249612191.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 00000007.00000000.249612191.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 00000000.00000002.252649732.00000000037D6000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 00000000.00000002.252649732.00000000037D6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 00000007.00000000.249317743.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 00000007.00000000.249317743.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 00000000.00000002.251887619.0000000003645000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 00000000.00000002.251887619.0000000003645000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 00000000.00000002.251765887.0000000003561000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 00000000.00000002.251765887.0000000003561000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: Process Memory Space: RegAsm.exe PID: 4276, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: Process Memory Space: RegAsm.exe PID: 4276, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 7.0.RegAsm.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 7.0.RegAsm.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 0.2.kyIfnzzg3E.exe.36e6e20.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 0.2.kyIfnzzg3E.exe.36e6e20.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 0.2.kyIfnzzg3E.exe.3736e40.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 0.2.kyIfnzzg3E.exe.3736e40.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 0.2.kyIfnzzg3E.exe.36bee00.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 0.2.kyIfnzzg3E.exe.36bee00.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 7.0.RegAsm.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 7.0.RegAsm.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 0.2.kyIfnzzg3E.exe.38d7c88.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 0.2.kyIfnzzg3E.exe.38d7c88.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 7.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 7.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 0.2.kyIfnzzg3E.exe.3736e40.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 0.2.kyIfnzzg3E.exe.3736e40.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 0.2.kyIfnzzg3E.exe.38d7c88.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 0.2.kyIfnzzg3E.exe.38d7c88.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 0.2.kyIfnzzg3E.exe.36bee00.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 0.2.kyIfnzzg3E.exe.36bee00.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 0.2.kyIfnzzg3E.exe.36e6e20.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 0.2.kyIfnzzg3E.exe.36e6e20.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_00BEE4A8
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_00BE3DD0
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_00BE3DC0
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_00BE46D8
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_00BE46CA
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_04DD0040
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_04DD0007
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_04DD5188
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_04DD5178
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_04DD492E
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_04DD7250
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_04DD7208
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_04F50040
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_04F50006
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_00BEAA78
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_000A3DFE
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 7_2_00BF3DFE
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\RegAsm.exe FFE4480CCC81B061F725C54587E9D1BA96547D27FE28083305D75796F2EB3E74
                Source: kyIfnzzg3E.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: kyIfnzzg3E.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: kyIfnzzg3E.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: win33.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: win33.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: win33.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: kyIfnzzg3E.exe, 00000000.00000002.251360548.0000000002410000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dll.muij% vs kyIfnzzg3E.exe
                Source: kyIfnzzg3E.exe, 00000000.00000002.251729227.0000000002629000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameclrjit.dllT vs kyIfnzzg3E.exe
                Source: kyIfnzzg3E.exe, 00000000.00000002.251729227.0000000002629000.00000004.00000001.sdmpBinary or memory string: OriginalFilename vs kyIfnzzg3E.exe
                Source: kyIfnzzg3E.exe, 00000000.00000002.251352952.0000000002400000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dllj% vs kyIfnzzg3E.exe
                Source: kyIfnzzg3E.exe, 00000000.00000002.250795419.0000000000276000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamenewww.exe$ vs kyIfnzzg3E.exe
                Source: kyIfnzzg3E.exe, 00000000.00000002.254711254.0000000004A40000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs kyIfnzzg3E.exe
                Source: kyIfnzzg3E.exe, 00000000.00000002.254907133.0000000004BB0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameRzvqtiwk.dll" vs kyIfnzzg3E.exe
                Source: kyIfnzzg3E.exeBinary or memory string: OriginalFilenamenewww.exe$ vs kyIfnzzg3E.exe
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeSection loaded: sfc.dll
                Source: kyIfnzzg3E.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                Source: 00000007.00000002.461789098.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 00000007.00000002.461789098.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 00000007.00000000.249612191.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 00000007.00000000.249612191.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 00000000.00000002.252649732.00000000037D6000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 00000000.00000002.252649732.00000000037D6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 00000007.00000000.249317743.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 00000007.00000000.249317743.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 00000000.00000002.251887619.0000000003645000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 00000000.00000002.251887619.0000000003645000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 00000000.00000002.251765887.0000000003561000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 00000000.00000002.251765887.0000000003561000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: Process Memory Space: RegAsm.exe PID: 4276, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: Process Memory Space: RegAsm.exe PID: 4276, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 7.0.RegAsm.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 7.0.RegAsm.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.0.RegAsm.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 0.2.kyIfnzzg3E.exe.36e6e20.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 0.2.kyIfnzzg3E.exe.36e6e20.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.kyIfnzzg3E.exe.36e6e20.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 0.2.kyIfnzzg3E.exe.3736e40.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 0.2.kyIfnzzg3E.exe.3736e40.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.kyIfnzzg3E.exe.3736e40.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 0.2.kyIfnzzg3E.exe.36bee00.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 0.2.kyIfnzzg3E.exe.36bee00.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.kyIfnzzg3E.exe.36bee00.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 7.0.RegAsm.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 7.0.RegAsm.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.0.RegAsm.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 0.2.kyIfnzzg3E.exe.38d7c88.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 0.2.kyIfnzzg3E.exe.38d7c88.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.kyIfnzzg3E.exe.38d7c88.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 7.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 7.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 0.2.kyIfnzzg3E.exe.3736e40.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 0.2.kyIfnzzg3E.exe.3736e40.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.kyIfnzzg3E.exe.3736e40.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 0.2.kyIfnzzg3E.exe.38d7c88.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 0.2.kyIfnzzg3E.exe.38d7c88.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.kyIfnzzg3E.exe.38d7c88.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 0.2.kyIfnzzg3E.exe.36bee00.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 0.2.kyIfnzzg3E.exe.36bee00.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 0.2.kyIfnzzg3E.exe.36e6e20.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 0.2.kyIfnzzg3E.exe.36e6e20.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: kyIfnzzg3E.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: win33.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: 7.0.RegAsm.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 7.0.RegAsm.exe.400000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
                Source: 7.0.RegAsm.exe.400000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
                Source: 7.0.RegAsm.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 7.0.RegAsm.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
                Source: 7.0.RegAsm.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
                Source: 7.2.RegAsm.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 7.2.RegAsm.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
                Source: 7.2.RegAsm.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
                Source: 7.0.RegAsm.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                Source: 7.0.RegAsm.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 7.0.RegAsm.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                Source: 7.0.RegAsm.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 7.2.RegAsm.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                Source: 7.2.RegAsm.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: classification engineClassification label: mal100.troj.evad.winEXE@5/5@39/1
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeFile created: C:\Users\user\AppData\Roaming\win33.exeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{4614bd42-26c0-4da0-8e09-16890d37c1d7}
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeFile created: C:\Users\user\AppData\Local\Temp\RegAsm.exeJump to behavior
                Source: kyIfnzzg3E.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: kyIfnzzg3E.exeVirustotal: Detection: 39%
                Source: kyIfnzzg3E.exeReversingLabs: Detection: 30%
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeFile read: C:\Users\user\Desktop\kyIfnzzg3E.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\kyIfnzzg3E.exe 'C:\Users\user\Desktop\kyIfnzzg3E.exe'
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exe
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exe
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exe
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exe
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: kyIfnzzg3E.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: kyIfnzzg3E.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: RegAsm.pdb source: RegAsm.exe, RegAsm.exe.0.dr
                Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000005.00000000.247162877.00000000000A2000.00000002.00020000.sdmp, RegAsm.exe, 00000007.00000000.249672602.0000000000BF2000.00000002.00020000.sdmp, RegAsm.exe.0.dr

                Data Obfuscation:

                barindex
                .NET source code contains potential unpackerShow sources
                Source: kyIfnzzg3E.exe, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.cs.Net Code: Hn9GJ4JDT System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: win33.exe.0.dr, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.cs.Net Code: Hn9GJ4JDT System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.2.kyIfnzzg3E.exe.1d0000.0.unpack, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.cs.Net Code: Hn9GJ4JDT System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.0.kyIfnzzg3E.exe.1d0000.0.unpack, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.cs.Net Code: Hn9GJ4JDT System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 7.0.RegAsm.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 7.0.RegAsm.exe.400000.3.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 7.0.RegAsm.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 7.0.RegAsm.exe.400000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 7.2.RegAsm.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 7.2.RegAsm.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Yara detected Costura Assembly LoaderShow sources
                Source: Yara matchFile source: kyIfnzzg3E.exe, type: SAMPLE
                Source: Yara matchFile source: 00000000.00000002.250699387.00000000001D2000.00000002.00020000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.251456849.0000000002561000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.194675696.00000000001D2000.00000002.00020000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: kyIfnzzg3E.exe PID: 5860, type: MEMORY
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\win33.exe, type: DROPPED
                Source: Yara matchFile source: 0.0.kyIfnzzg3E.exe.1d0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.1d0000.0.unpack, type: UNPACKEDPE
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_00BE622E push cs; iretd
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_00BE1B5C push edx; retf
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_04DD31C9 push cs; iretd
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_04DD3587 push eax; retf
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_04DD3180 push edi; iretd
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeCode function: 0_2_04F53674 push edi; retf
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_000A4289 push es; retf
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_000A4469 push cs; retf
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_000A44A3 push es; retf
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 7_2_00BF4469 push cs; retf
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 7_2_00BF44A3 push es; retf
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 7_2_00BF4289 push es; retf
                Source: initial sampleStatic PE information: section name: .text entropy: 7.98582259438
                Source: initial sampleStatic PE information: section name: .text entropy: 7.98582259438
                Source: kyIfnzzg3E.exe, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.csHigh entropy of concatenated method names: '.cctor', 'zqgic31sZ', 'OE1LXhAJf', 'rTlgnm26K', 'yXe9vKN53', 'HgYWLlYwd', 'OOoeUTCVM', 'Hn9GJ4JDT', 'RlTh8Xoso', 'f5YbYq4yk'
                Source: kyIfnzzg3E.exe, Gwb8v4YxZqC6FEkpMk/mORTpnCQJ3B7vbp15A.csHigh entropy of concatenated method names: '.ctor', 'D2c22Wn99', 'le7MU2Fw5', 'CDrt6kaG8', 'lMB3nusPW', 'GZ60NKJ5c', 'o9Y2qKfZ5AfavGDQhT6', 'bUC817fVwETYWgUdPFR', 'DWb9RqfqoNLd8Pf9HAi', 'gyuxNCfxp7eWogKQX1I'
                Source: win33.exe.0.dr, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.csHigh entropy of concatenated method names: '.cctor', 'zqgic31sZ', 'OE1LXhAJf', 'rTlgnm26K', 'yXe9vKN53', 'HgYWLlYwd', 'OOoeUTCVM', 'Hn9GJ4JDT', 'RlTh8Xoso', 'f5YbYq4yk'
                Source: win33.exe.0.dr, Gwb8v4YxZqC6FEkpMk/mORTpnCQJ3B7vbp15A.csHigh entropy of concatenated method names: '.ctor', 'D2c22Wn99', 'le7MU2Fw5', 'CDrt6kaG8', 'lMB3nusPW', 'GZ60NKJ5c', 'o9Y2qKfZ5AfavGDQhT6', 'bUC817fVwETYWgUdPFR', 'DWb9RqfqoNLd8Pf9HAi', 'gyuxNCfxp7eWogKQX1I'
                Source: 0.2.kyIfnzzg3E.exe.1d0000.0.unpack, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.csHigh entropy of concatenated method names: '.cctor', 'zqgic31sZ', 'OE1LXhAJf', 'rTlgnm26K', 'yXe9vKN53', 'HgYWLlYwd', 'OOoeUTCVM', 'Hn9GJ4JDT', 'RlTh8Xoso', 'f5YbYq4yk'
                Source: 0.2.kyIfnzzg3E.exe.1d0000.0.unpack, Gwb8v4YxZqC6FEkpMk/mORTpnCQJ3B7vbp15A.csHigh entropy of concatenated method names: '.ctor', 'D2c22Wn99', 'le7MU2Fw5', 'CDrt6kaG8', 'lMB3nusPW', 'GZ60NKJ5c', 'o9Y2qKfZ5AfavGDQhT6', 'bUC817fVwETYWgUdPFR', 'DWb9RqfqoNLd8Pf9HAi', 'gyuxNCfxp7eWogKQX1I'
                Source: 0.0.kyIfnzzg3E.exe.1d0000.0.unpack, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.csHigh entropy of concatenated method names: '.cctor', 'zqgic31sZ', 'OE1LXhAJf', 'rTlgnm26K', 'yXe9vKN53', 'HgYWLlYwd', 'OOoeUTCVM', 'Hn9GJ4JDT', 'RlTh8Xoso', 'f5YbYq4yk'
                Source: 0.0.kyIfnzzg3E.exe.1d0000.0.unpack, Gwb8v4YxZqC6FEkpMk/mORTpnCQJ3B7vbp15A.csHigh entropy of concatenated method names: '.ctor', 'D2c22Wn99', 'le7MU2Fw5', 'CDrt6kaG8', 'lMB3nusPW', 'GZ60NKJ5c', 'o9Y2qKfZ5AfavGDQhT6', 'bUC817fVwETYWgUdPFR', 'DWb9RqfqoNLd8Pf9HAi', 'gyuxNCfxp7eWogKQX1I'
                Source: 7.0.RegAsm.exe.400000.3.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
                Source: 7.0.RegAsm.exe.400000.3.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
                Source: 7.0.RegAsm.exe.400000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
                Source: 7.0.RegAsm.exe.400000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
                Source: 7.2.RegAsm.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
                Source: 7.2.RegAsm.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeFile created: C:\Users\user\AppData\Roaming\win33.exeJump to dropped file
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeFile created: C:\Users\user\AppData\Local\Temp\RegAsm.exeJump to dropped file

                Boot Survival:

                barindex
                Creates an undocumented autostart registry key Show sources
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior

                Hooking and other Techniques for Hiding and Protection:

                barindex
                Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Temp\RegAsm.exe:Zone.Identifier read attributes | delete
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion:

                barindex
                Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                Source: kyIfnzzg3E.exe, 00000000.00000002.251729227.0000000002629000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL0SELECT * FROM WIN32_BIOS8UNEXPECTED WMI QUERY FAILURE
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWindow / User API: threadDelayed 3232
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWindow / User API: threadDelayed 5877
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWindow / User API: foregroundWindowGot 694
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWindow / User API: foregroundWindowGot 747
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exe TID: 5460Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exe TID: 5956Thread sleep time: -4611686018427385s >= -30000s
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeThread delayed: delay time: 922337203685477
                Source: kyIfnzzg3E.exe, 00000000.00000002.251729227.0000000002629000.00000004.00000001.sdmpBinary or memory string: 0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
                Source: kyIfnzzg3E.exe, 00000000.00000002.251729227.0000000002629000.00000004.00000001.sdmpBinary or memory string: vmware
                Source: kyIfnzzg3E.exe, 00000000.00000002.251729227.0000000002629000.00000004.00000001.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess token adjusted: Debug
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                Allocates memory in foreign processesShow sources
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeMemory allocated: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 400000 protect: page execute and read and write
                Injects a PE file into a foreign processesShow sources
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 400000 value starts with: 4D5A
                Writes to foreign memory regionsShow sources
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 400000
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 402000
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 420000
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 422000
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: FD0008
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exe
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exe
                Source: C:\Users\user\Desktop\kyIfnzzg3E.exeQueries volume information: C:\Users\user\Desktop\kyIfnzzg3E.exe VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Users\user\AppData\Local\Temp\RegAsm.exe VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information:

                barindex
                Yara detected Nanocore RATShow sources
                Source: Yara matchFile source: 00000007.00000002.461789098.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000000.249612191.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.252649732.00000000037D6000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000000.249317743.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.251887619.0000000003645000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.251765887.0000000003561000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4276, type: MEMORY
                Source: Yara matchFile source: 7.0.RegAsm.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.36e6e20.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.3736e40.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.36bee00.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.0.RegAsm.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.38d7c88.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.3736e40.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.38d7c88.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.36bee00.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.36e6e20.3.raw.unpack, type: UNPACKEDPE

                Remote Access Functionality:

                barindex
                Detected Nanocore RatShow sources
                Source: RegAsm.exe, 00000007.00000002.461789098.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
                Yara detected Nanocore RATShow sources
                Source: Yara matchFile source: 00000007.00000002.461789098.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000000.249612191.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.252649732.00000000037D6000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000000.249317743.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.251887619.0000000003645000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.251765887.0000000003561000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4276, type: MEMORY
                Source: Yara matchFile source: 7.0.RegAsm.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.36e6e20.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.3736e40.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.36bee00.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.0.RegAsm.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.38d7c88.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.3736e40.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.38d7c88.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.36bee00.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kyIfnzzg3E.exe.36e6e20.3.raw.unpack, type: UNPACKEDPE

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management InstrumentationRegistry Run Keys / Startup Folder1Process Injection311Masquerading1OS Credential DumpingSecurity Software Discovery21Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobDLL Side-Loading1Registry Run Keys / Startup Folder1Disable or Modify Tools1LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)DLL Side-Loading1Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection311NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information3DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)DLL Side-Loading1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                kyIfnzzg3E.exe39%VirustotalBrowse
                kyIfnzzg3E.exe30%ReversingLabsByteCode-MSIL.Trojan.Bulz
                kyIfnzzg3E.exe100%Joe Sandbox ML

                Dropped Files

                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\win33.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\RegAsm.exe0%MetadefenderBrowse
                C:\Users\user\AppData\Local\Temp\RegAsm.exe0%ReversingLabs
                C:\Users\user\AppData\Roaming\win33.exe30%ReversingLabsByteCode-MSIL.Trojan.Bulz

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                7.0.RegAsm.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
                7.0.RegAsm.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
                7.2.RegAsm.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

                Domains

                SourceDetectionScannerLabelLink
                wekeepworking.sytes.net8%VirustotalBrowse
                wekeepworking12.sytes.net2%VirustotalBrowse

                URLs

                SourceDetectionScannerLabelLink
                wekeepworking.sytes.net8%VirustotalBrowse
                wekeepworking.sytes.net0%Avira URL Cloudsafe
                wekeepworking12.sytes.net2%VirustotalBrowse
                wekeepworking12.sytes.net0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                wekeepworking.sytes.net
                79.134.225.90
                truetrueunknown
                wekeepworking12.sytes.net
                unknown
                unknowntrueunknown

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                wekeepworking.sytes.nettrue
                • 8%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                wekeepworking12.sytes.nettrue
                • 2%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                79.134.225.90
                wekeepworking.sytes.netSwitzerland
                6775FINK-TELECOM-SERVICESCHtrue

                General Information

                Joe Sandbox Version:32.0.0 Black Diamond
                Analysis ID:431751
                Start date:09.06.2021
                Start time:08:47:15
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 8m 31s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:kyIfnzzg3E.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:27
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@5/5@39/1
                EGA Information:Failed
                HDC Information:
                • Successful, ratio: 4.4% (good quality ratio 3.5%)
                • Quality average: 54.1%
                • Quality standard deviation: 33.1%
                HCA Information:
                • Successful, ratio: 91%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .exe
                Warnings:
                Show All
                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 20.82.210.154, 52.147.198.201, 52.255.188.83, 92.122.145.220, 40.88.32.150, 104.43.139.144, 168.61.161.212, 104.43.193.48, 20.50.102.62, 23.218.208.56, 93.184.221.240, 20.54.26.129, 92.122.213.247, 92.122.213.194
                • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, wu.wpc.apr-52dd2.edgecastdns.net, au-bg-shim.trafficmanager.net, www.bing.com, fs.microsoft.com, dual-a-0001.a-msedge.net, wu.ec.azureedge.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                08:48:28API Interceptor867x Sleep call for process: RegAsm.exe modified

                Joe Sandbox View / Context

                IPs

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                79.134.225.90Ref 0180066743.xlsxGet hashmaliciousBrowse
                  AedJpyQ9lM.exeGet hashmaliciousBrowse
                    Purchase Order Price List.xlsxGet hashmaliciousBrowse
                      qdFDmi3Bhy.exeGet hashmaliciousBrowse
                        A2PlnLyOA7.exeGet hashmaliciousBrowse
                          SecuriteInfo.com.Trojan.GenericKD.37013274.28794.exeGet hashmaliciousBrowse
                            LOT_20210526.xlsxGet hashmaliciousBrowse
                              Q2MAUt4mRO.exeGet hashmaliciousBrowse
                                4fn66P5vkl.exeGet hashmaliciousBrowse
                                  P_O 00041221.xlsxGet hashmaliciousBrowse
                                    LOT_20210526.xlsxGet hashmaliciousBrowse
                                      Swift Copy.exeGet hashmaliciousBrowse

                                        Domains

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        wekeepworking.sytes.netRef 0180066743.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        AedJpyQ9lM.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        Purchase Order Price List.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        qdFDmi3Bhy.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        A2PlnLyOA7.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        SecuriteInfo.com.Trojan.GenericKD.37013274.28794.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        LOT_20210526.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        Q2MAUt4mRO.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        4fn66P5vkl.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        P_O 00041221.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        LOT_20210526.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        QI5MR3pte0.exeGet hashmaliciousBrowse
                                        • 185.140.53.40
                                        5Em2NXNxSt.exeGet hashmaliciousBrowse
                                        • 185.140.53.40
                                        7Zpsd899Kf.exeGet hashmaliciousBrowse
                                        • 185.140.53.40
                                        LfgEatrwIF.exeGet hashmaliciousBrowse
                                        • 185.140.53.40

                                        ASN

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        FINK-TELECOM-SERVICESCHRef 0180066743.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        MS2106071066.exeGet hashmaliciousBrowse
                                        • 79.134.225.71
                                        Kangean PO.docGet hashmaliciousBrowse
                                        • 79.134.225.72
                                        facture.jarGet hashmaliciousBrowse
                                        • 79.134.225.69
                                        c3yBu1IF57.exeGet hashmaliciousBrowse
                                        • 79.134.225.92
                                        DPSGNwkO1Z.exeGet hashmaliciousBrowse
                                        • 79.134.225.25
                                        SecuriteInfo.com.Trojan.Win32.Save.a.16917.exeGet hashmaliciousBrowse
                                        • 79.134.225.94
                                        AedJpyQ9lM.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        H538065217Invoice.exeGet hashmaliciousBrowse
                                        • 79.134.225.9
                                        Purchase Order Price List.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        P.I-84512.docGet hashmaliciousBrowse
                                        • 79.134.225.41
                                        l00VLAF9y0xQ9Vr.exeGet hashmaliciousBrowse
                                        • 79.134.225.92
                                        Swift [ref QT #U2013 2102001-R2]pdf.exeGet hashmaliciousBrowse
                                        • 79.134.225.10
                                        PO756654.exeGet hashmaliciousBrowse
                                        • 79.134.225.99
                                        qdFDmi3Bhy.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        br.exeGet hashmaliciousBrowse
                                        • 79.134.225.73
                                        Yeni sipari#U015f _WJO-001, pdf.exeGet hashmaliciousBrowse
                                        • 79.134.225.71
                                        as.exeGet hashmaliciousBrowse
                                        • 79.134.225.73
                                        11.exeGet hashmaliciousBrowse
                                        • 79.134.225.40
                                        V8IB839cvz.exeGet hashmaliciousBrowse
                                        • 79.134.225.25

                                        JA3 Fingerprints

                                        No context

                                        Dropped Files

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        C:\Users\user\AppData\Local\Temp\RegAsm.exeflyZab7hHk.exeGet hashmaliciousBrowse
                                          AedJpyQ9lM.exeGet hashmaliciousBrowse
                                            UPDATED SOA.exeGet hashmaliciousBrowse
                                              qdFDmi3Bhy.exeGet hashmaliciousBrowse
                                                RFQ27559404D4E5A.PDF.exeGet hashmaliciousBrowse
                                                  Receiptn.exeGet hashmaliciousBrowse
                                                    PURCHASE LIST.exeGet hashmaliciousBrowse
                                                      SecuriteInfo.com.Trojan.PackedNET.783.10804.exeGet hashmaliciousBrowse
                                                        Y6k2VgaGck.exeGet hashmaliciousBrowse
                                                          Bank swift.exeGet hashmaliciousBrowse
                                                            tT1XWdxOYv.exeGet hashmaliciousBrowse
                                                              363IN050790620 BOOKING.exeGet hashmaliciousBrowse
                                                                New Order.exeGet hashmaliciousBrowse
                                                                  RFQ#21040590409448.pdf.exeGet hashmaliciousBrowse
                                                                    DHL#DOCUMENTS02010910.PDF.exeGet hashmaliciousBrowse
                                                                      QOUTATION#2300003590.PDF.exeGet hashmaliciousBrowse
                                                                        1p037oXV3S.exeGet hashmaliciousBrowse
                                                                          BaU9m8mMFx.exeGet hashmaliciousBrowse
                                                                            yl77tM4JDg.exeGet hashmaliciousBrowse
                                                                              Payment Advice Reference0000 docx.exeGet hashmaliciousBrowse

                                                                                Created / dropped Files

                                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\kyIfnzzg3E.exe.log
                                                                                Process:C:\Users\user\Desktop\kyIfnzzg3E.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:modified
                                                                                Size (bytes):425
                                                                                Entropy (8bit):5.340009400190196
                                                                                Encrypted:false
                                                                                SSDEEP:12:Q3La/KDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhav:ML9E4Ks2wKDE4KhK3VZ9pKhk
                                                                                MD5:CC144808DBAF00E03294347EADC8E779
                                                                                SHA1:A3434FC71BA82B7512C813840427C687ADDB5AEA
                                                                                SHA-256:3FC7B9771439E777A8F8B8579DD499F3EB90859AD30EFD8A765F341403FC7101
                                                                                SHA-512:A4F9EB98200BCAF388F89AABAF7EA57661473687265597B13192C24F06638C6339A3BD581DF4E002F26EE1BA09410F6A2BBDB4DA0CD40B59D63A09BAA1AADD3D
                                                                                Malicious:true
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                                                                                C:\Users\user\AppData\Local\Temp\RegAsm.exe
                                                                                Process:C:\Users\user\Desktop\kyIfnzzg3E.exe
                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):64616
                                                                                Entropy (8bit):6.037264560032456
                                                                                Encrypted:false
                                                                                SSDEEP:768:J8XcJiMjm2ieHlPyCsSuJbn8dBhFVBSMQ6Iq8TSYDKpgLaDViRLNdr:9YMaNylPYSAb8dBnTHv8DKKaDVkX
                                                                                MD5:6FD7592411112729BF6B1F2F6C34899F
                                                                                SHA1:5E5C839726D6A43C478AB0B95DBF52136679F5EA
                                                                                SHA-256:FFE4480CCC81B061F725C54587E9D1BA96547D27FE28083305D75796F2EB3E74
                                                                                SHA-512:21EFCC9DEE3960F1A64C6D8A44871742558666BB792D77ACE91236C7DBF42A6CA77086918F363C4391D9C00904C55A952E2C18BE5FA1A67A509827BFC630070D
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Joe Sandbox View:
                                                                                • Filename: flyZab7hHk.exe, Detection: malicious, Browse
                                                                                • Filename: AedJpyQ9lM.exe, Detection: malicious, Browse
                                                                                • Filename: UPDATED SOA.exe, Detection: malicious, Browse
                                                                                • Filename: qdFDmi3Bhy.exe, Detection: malicious, Browse
                                                                                • Filename: RFQ27559404D4E5A.PDF.exe, Detection: malicious, Browse
                                                                                • Filename: Receiptn.exe, Detection: malicious, Browse
                                                                                • Filename: PURCHASE LIST.exe, Detection: malicious, Browse
                                                                                • Filename: SecuriteInfo.com.Trojan.PackedNET.783.10804.exe, Detection: malicious, Browse
                                                                                • Filename: Y6k2VgaGck.exe, Detection: malicious, Browse
                                                                                • Filename: Bank swift.exe, Detection: malicious, Browse
                                                                                • Filename: tT1XWdxOYv.exe, Detection: malicious, Browse
                                                                                • Filename: 363IN050790620 BOOKING.exe, Detection: malicious, Browse
                                                                                • Filename: New Order.exe, Detection: malicious, Browse
                                                                                • Filename: RFQ#21040590409448.pdf.exe, Detection: malicious, Browse
                                                                                • Filename: DHL#DOCUMENTS02010910.PDF.exe, Detection: malicious, Browse
                                                                                • Filename: QOUTATION#2300003590.PDF.exe, Detection: malicious, Browse
                                                                                • Filename: 1p037oXV3S.exe, Detection: malicious, Browse
                                                                                • Filename: BaU9m8mMFx.exe, Detection: malicious, Browse
                                                                                • Filename: yl77tM4JDg.exe, Detection: malicious, Browse
                                                                                • Filename: Payment Advice Reference0000 docx.exe, Detection: malicious, Browse
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...xX.Z..............0.............^.... ........@.. ....................... ............`.....................................O.......8...............h>........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                Process:C:\Users\user\AppData\Local\Temp\RegAsm.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):8
                                                                                Entropy (8bit):3.0
                                                                                Encrypted:false
                                                                                SSDEEP:3:mFn:mFn
                                                                                MD5:945B90EA6AB1D08300EFEDF91C6CF420
                                                                                SHA1:4005449440FA1F4CB80CBAAD1696EE772B146466
                                                                                SHA-256:8216AC6AE2A35895233B0689C5A16B4AF33A03BBA6926523BC015B50F950C8CB
                                                                                SHA-512:B263F02367AF88FE208B3D365FEC89649F4916D55C8691704CD2DB59B3C91848CB2D2480CF1D0247FBDFCD89FD37C6DF6BE0A548CD4235A3056F6F5E240AD26E
                                                                                Malicious:true
                                                                                Reputation:low
                                                                                Preview: .&.^+.H
                                                                                C:\Users\user\AppData\Roaming\win33.exe
                                                                                Process:C:\Users\user\Desktop\kyIfnzzg3E.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):734208
                                                                                Entropy (8bit):7.833756558737052
                                                                                Encrypted:false
                                                                                SSDEEP:12288:iRqIue16rc2fV5hZcK1KjkiZCx7jsFuR6Y/ctiBHkcpZtoMZ:AqIue1kff/ECKwiZCx34mcC9LtoMZ
                                                                                MD5:EB43B3C033BD76B51B90A51A6726A81C
                                                                                SHA1:0D39FFCF64ED4F38EA83A72D726D40881F583014
                                                                                SHA-256:4E9A5CC90F1D17550208942E0182E9A99598C18C19B3467C184A46F4214755E2
                                                                                SHA-512:7EFB598153F2C4760FE17F7EF6510F5A48482027434B303A93439BD4C472C3D4E676E3BB8AED268277696F834DC93EA8853481D94C5FACAF61BECF4A23C17A8C
                                                                                Malicious:true
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\Users\user\AppData\Roaming\win33.exe, Author: Joe Security
                                                                                Antivirus:
                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                • Antivirus: ReversingLabs, Detection: 30%
                                                                                Reputation:low
                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....`.................(...........G... ...`....@.. ....................................@.................................PG..K....`..`............................................................................ ............... ..H............text....'... ...(.................. ..`.rsrc...`....`.......*..............@..@.reloc...............2..............@..B.................G......H........S.. ;..............2............................................0.......... ........8........E....}...).......I.......8x...(....8....8t... ....~....9....&8.....:4... ....~a...:....& ....8....8/... ....~{...:....&8....(.... ....~*...9p...&8f....:....8....*8....8.......*....(....*..(0...*&~.......*...~....*..0..t........(.... ....~!...:....& ....8....8........E.... .......8....*8.... ....~q...:....&8.......9....&&8....8....}....8....~...9....8....&{....8....&8....*~...
                                                                                C:\Users\user\AppData\Roaming\win33.exe:Zone.Identifier
                                                                                Process:C:\Users\user\Desktop\kyIfnzzg3E.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):26
                                                                                Entropy (8bit):3.95006375643621
                                                                                Encrypted:false
                                                                                SSDEEP:3:ggPYV:rPYV
                                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                Malicious:true
                                                                                Reputation:high, very likely benign file
                                                                                Preview: [ZoneTransfer]....ZoneId=0

                                                                                Static File Info

                                                                                General

                                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Entropy (8bit):7.833756558737052
                                                                                TrID:
                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                                File name:kyIfnzzg3E.exe
                                                                                File size:734208
                                                                                MD5:eb43b3c033bd76b51b90a51a6726a81c
                                                                                SHA1:0d39ffcf64ed4f38ea83a72d726d40881f583014
                                                                                SHA256:4e9a5cc90f1d17550208942e0182e9a99598c18c19b3467c184a46f4214755e2
                                                                                SHA512:7efb598153f2c4760fe17f7ef6510f5a48482027434b303a93439bd4c472c3d4e676e3bb8aed268277696f834dc93ea8853481d94c5facaf61becf4a23c17a8c
                                                                                SSDEEP:12288:iRqIue16rc2fV5hZcK1KjkiZCx7jsFuR6Y/ctiBHkcpZtoMZ:AqIue1kff/ECKwiZCx34mcC9LtoMZ
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`.................(...........G... ...`....@.. ....................................@................................

                                                                                File Icon

                                                                                Icon Hash:5cd0e8ccc4ec30f0

                                                                                Static PE Info

                                                                                General

                                                                                Entrypoint:0x4a479e
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                Time Stamp:0x60BFED7F [Tue Jun 8 22:21:51 2021 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:v4.0.30319
                                                                                OS Version Major:4
                                                                                OS Version Minor:0
                                                                                File Version Major:4
                                                                                File Version Minor:0
                                                                                Subsystem Version Major:4
                                                                                Subsystem Version Minor:0
                                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                Entrypoint Preview

                                                                                Instruction
                                                                                jmp dword ptr [00402000h]
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al

                                                                                Data Directories

                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xa47500x4b.text
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xa60000x10760.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xb80000xc.reloc
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                Sections

                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x20000xa27a40xa2800False0.982952223558data7.98582259438IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                .rsrc0xa60000x107600x10800False0.387976444129data4.61292982657IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .reloc0xb80000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                Resources

                                                                                NameRVASizeTypeLanguageCountry
                                                                                RT_ICON0xa63700x2e8data
                                                                                RT_ICON0xa66580x128GLS_BINARY_LSB_FIRST
                                                                                RT_ICON0xa67800xea8data
                                                                                RT_ICON0xa76280x8a8data
                                                                                RT_ICON0xa7ed00x568GLS_BINARY_LSB_FIRST
                                                                                RT_ICON0xa84380x35e2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                                RT_ICON0xaba1c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 240, next used block 117440512
                                                                                RT_ICON0xafc440x25a8data
                                                                                RT_ICON0xb21ec0x1a68data
                                                                                RT_ICON0xb3c540x10a8data
                                                                                RT_ICON0xb4cfc0x988data
                                                                                RT_ICON0xb56840x6b8data
                                                                                RT_ICON0xb5d3c0x468GLS_BINARY_LSB_FIRST
                                                                                RT_GROUP_ICON0xb61a40xbcdata
                                                                                RT_VERSION0xb62600x2fadata
                                                                                RT_MANIFEST0xb655c0x204XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators

                                                                                Imports

                                                                                DLLImport
                                                                                mscoree.dll_CorExeMain

                                                                                Version Infos

                                                                                DescriptionData
                                                                                Translation0x0000 0x04b0
                                                                                LegalCopyright
                                                                                Assembly Version1.0.1508.40811
                                                                                InternalNamenewww.exe
                                                                                FileVersion1.0.1508.40811
                                                                                CompanyName
                                                                                LegalTrademarks
                                                                                Comments
                                                                                ProductName
                                                                                ProductVersion1.0.1508.40811
                                                                                FileDescription
                                                                                OriginalFilenamenewww.exe

                                                                                Network Behavior

                                                                                Network Port Distribution

                                                                                TCP Packets

                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Jun 9, 2021 08:48:30.492832899 CEST497221144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:48:30.538338900 CEST11444972279.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:48:31.043322086 CEST497221144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:48:31.086380959 CEST11444972279.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:48:31.590065956 CEST497221144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:48:31.632601976 CEST11444972279.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:48:35.808168888 CEST497271144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:48:35.852250099 CEST11444972779.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:48:36.418606043 CEST497271144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:48:36.462543011 CEST11444972779.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:48:37.012557030 CEST497271144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:48:37.056930065 CEST11444972779.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:48:41.181077003 CEST497281144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:48:41.225888968 CEST11444972879.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:48:41.856554031 CEST497281144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:48:41.900649071 CEST11444972879.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:48:42.466006041 CEST497281144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:48:42.509877920 CEST11444972879.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:48:59.660293102 CEST497311144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:48:59.702373981 CEST11444973179.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:00.201960087 CEST497311144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:00.244203091 CEST11444973179.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:00.748927116 CEST497311144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:00.793133020 CEST11444973179.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:04.884386063 CEST497321144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:04.928196907 CEST11444973279.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:05.436755896 CEST497321144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:05.479208946 CEST11444973279.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:05.983643055 CEST497321144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:06.026487112 CEST11444973279.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:10.116617918 CEST497361144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:10.158963919 CEST11444973679.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:10.671611071 CEST497361144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:10.714097977 CEST11444973679.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:11.218420029 CEST497361144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:11.263479948 CEST11444973679.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:28.890695095 CEST497421144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:28.935745955 CEST11444974279.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:29.438746929 CEST497421144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:29.482963085 CEST11444974279.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:29.985918045 CEST497421144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:30.028435946 CEST11444974279.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:34.492960930 CEST497431144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:34.537755013 CEST11444974379.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:35.048645020 CEST497431144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:35.093532085 CEST11444974379.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:35.596123934 CEST497431144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:35.642057896 CEST11444974379.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:39.823215008 CEST497441144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:39.865605116 CEST11444974479.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:40.377159119 CEST497441144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:40.419565916 CEST11444974479.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:40.924705982 CEST497441144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:40.967267036 CEST11444974479.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:58.248878002 CEST497471144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:58.291173935 CEST11444974779.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:58.800643921 CEST497471144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:58.842880964 CEST11444974779.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:49:59.347985029 CEST497471144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:49:59.390316963 CEST11444974779.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:50:03.485637903 CEST497481144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:50:03.530579090 CEST11444974879.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:50:04.035356045 CEST497481144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:50:04.077658892 CEST11444974879.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:50:04.582314968 CEST497481144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:50:04.624696970 CEST11444974879.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:50:08.710596085 CEST497491144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:50:08.752954960 CEST11444974979.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:50:09.254671097 CEST497491144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:50:09.297004938 CEST11444974979.134.225.90192.168.2.3
                                                                                Jun 9, 2021 08:50:09.801518917 CEST497491144192.168.2.379.134.225.90
                                                                                Jun 9, 2021 08:50:09.846333981 CEST11444974979.134.225.90192.168.2.3

                                                                                UDP Packets

                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Jun 9, 2021 08:47:53.241635084 CEST6098553192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:47:53.275907993 CEST5020053192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:47:53.297370911 CEST53609858.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:47:53.331430912 CEST53502008.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:47:53.505259037 CEST5128153192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:47:53.549897909 CEST53512818.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:47:54.264780045 CEST4919953192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:47:54.307323933 CEST53491998.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:47:55.117296934 CEST5062053192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:47:55.160305023 CEST53506208.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:47:55.579394102 CEST6493853192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:47:55.626178026 CEST53649388.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:47:55.929938078 CEST6015253192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:47:55.975030899 CEST53601528.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:47:56.787668943 CEST5754453192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:47:56.832351923 CEST53575448.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:47:57.808399916 CEST5598453192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:47:57.852735996 CEST53559848.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:47:58.695384026 CEST6418553192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:47:58.739733934 CEST53641858.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:47:59.735668898 CEST6511053192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:47:59.778043985 CEST53651108.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:00.600630999 CEST5836153192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:00.644928932 CEST53583618.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:01.759715080 CEST6349253192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:01.803847075 CEST53634928.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:02.577128887 CEST6083153192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:02.623513937 CEST53608318.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:03.476696968 CEST6010053192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:03.519418955 CEST53601008.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:04.354495049 CEST5319553192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:04.398684025 CEST53531958.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:05.284854889 CEST5014153192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:05.328080893 CEST53501418.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:06.224553108 CEST5302353192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:06.268099070 CEST53530238.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:06.993591070 CEST4956353192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:07.037317991 CEST53495638.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:08.911042929 CEST5135253192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:08.953775883 CEST53513528.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:18.489336014 CEST5934953192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:18.531994104 CEST53593498.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:19.386548996 CEST5708453192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:19.429124117 CEST53570848.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:30.427062035 CEST5882353192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:30.474170923 CEST53588238.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:31.550014973 CEST5756853192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:31.608191013 CEST53575688.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:32.200175047 CEST5054053192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:32.277391911 CEST53505408.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:35.760768890 CEST5436653192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:35.807027102 CEST53543668.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:41.134452105 CEST5303453192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:41.179805994 CEST53530348.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:46.537439108 CEST5776253192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:46.583004951 CEST53577628.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:46.586323977 CEST5543553192.168.2.38.8.4.4
                                                                                Jun 9, 2021 08:48:46.630914927 CEST53554358.8.4.4192.168.2.3
                                                                                Jun 9, 2021 08:48:46.871432066 CEST5071353192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:46.914984941 CEST53507138.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:48.450140953 CEST5613253192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:48.492501974 CEST53561328.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:50.207556009 CEST5898753192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:50.261017084 CEST53589878.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:50.960513115 CEST5657953192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:51.005275965 CEST53565798.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:51.007548094 CEST6063353192.168.2.38.8.4.4
                                                                                Jun 9, 2021 08:48:51.052164078 CEST53606338.8.4.4192.168.2.3
                                                                                Jun 9, 2021 08:48:51.203886032 CEST6129253192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:51.247024059 CEST53612928.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:55.272496939 CEST6361953192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:55.318202972 CEST53636198.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:55.339243889 CEST6493853192.168.2.38.8.4.4
                                                                                Jun 9, 2021 08:48:55.381805897 CEST53649388.8.4.4192.168.2.3
                                                                                Jun 9, 2021 08:48:55.504285097 CEST6194653192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:55.548743963 CEST53619468.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:48:59.616060019 CEST6491053192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:48:59.659225941 CEST53649108.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:04.839395046 CEST5212353192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:04.882405996 CEST53521238.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:07.188539982 CEST5613053192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:07.234091043 CEST53561308.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:10.071288109 CEST5633853192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:10.115674973 CEST53563388.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:10.839473009 CEST5942053192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:10.886074066 CEST53594208.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:15.360275030 CEST5878453192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:15.404757977 CEST53587848.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:15.408368111 CEST6397853192.168.2.38.8.4.4
                                                                                Jun 9, 2021 08:49:15.451459885 CEST53639788.8.4.4192.168.2.3
                                                                                Jun 9, 2021 08:49:15.927696943 CEST6293853192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:15.972949028 CEST53629388.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:20.106766939 CEST5570853192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:20.151357889 CEST53557088.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:20.180037022 CEST5680353192.168.2.38.8.4.4
                                                                                Jun 9, 2021 08:49:20.224138021 CEST53568038.8.4.4192.168.2.3
                                                                                Jun 9, 2021 08:49:20.445542097 CEST5714553192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:20.490443945 CEST53571458.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:24.537130117 CEST5535953192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:24.580580950 CEST53553598.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:24.583209038 CEST5830653192.168.2.38.8.4.4
                                                                                Jun 9, 2021 08:49:24.626281977 CEST53583068.8.4.4192.168.2.3
                                                                                Jun 9, 2021 08:49:24.668420076 CEST6412453192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:24.714664936 CEST53641248.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:28.791361094 CEST4936153192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:28.834433079 CEST53493618.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:34.405328989 CEST6315053192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:34.447954893 CEST53631508.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:39.757822990 CEST5327953192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:39.803596020 CEST53532798.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:42.495457888 CEST5688153192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:42.553116083 CEST53568818.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:43.923571110 CEST5364253192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:43.966646910 CEST53536428.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:45.137665987 CEST5566753192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:45.180632114 CEST53556678.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:45.314492941 CEST5483353192.168.2.38.8.4.4
                                                                                Jun 9, 2021 08:49:45.360850096 CEST53548338.8.4.4192.168.2.3
                                                                                Jun 9, 2021 08:49:45.404165030 CEST6247653192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:45.451158047 CEST53624768.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:49.507503986 CEST4970553192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:49.551829100 CEST53497058.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:49.654870033 CEST6147753192.168.2.38.8.4.4
                                                                                Jun 9, 2021 08:49:49.697932005 CEST53614778.8.4.4192.168.2.3
                                                                                Jun 9, 2021 08:49:49.770097017 CEST6163353192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:49.812983036 CEST53616338.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:53.939744949 CEST5594953192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:53.983303070 CEST53559498.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:53.990129948 CEST5760153192.168.2.38.8.4.4
                                                                                Jun 9, 2021 08:49:54.033220053 CEST53576018.8.4.4192.168.2.3
                                                                                Jun 9, 2021 08:49:54.121324062 CEST4934253192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:54.167078018 CEST53493428.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:49:58.202971935 CEST5625353192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:49:58.247427940 CEST53562538.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:50:03.425534964 CEST4966753192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:50:03.472016096 CEST53496678.8.8.8192.168.2.3
                                                                                Jun 9, 2021 08:50:08.665294886 CEST5543953192.168.2.38.8.8.8
                                                                                Jun 9, 2021 08:50:08.709853888 CEST53554398.8.8.8192.168.2.3

                                                                                DNS Queries

                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                Jun 9, 2021 08:48:30.427062035 CEST192.168.2.38.8.8.80x6606Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:48:35.760768890 CEST192.168.2.38.8.8.80xd85bStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:48:41.134452105 CEST192.168.2.38.8.8.80xb68cStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:48:46.537439108 CEST192.168.2.38.8.8.80xe399Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:48:46.586323977 CEST192.168.2.38.8.4.40x6e14Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:48:46.871432066 CEST192.168.2.38.8.8.80xdd80Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:48:50.960513115 CEST192.168.2.38.8.8.80xbe2Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:48:51.007548094 CEST192.168.2.38.8.4.40xb17bStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:48:51.203886032 CEST192.168.2.38.8.8.80x829bStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:48:55.272496939 CEST192.168.2.38.8.8.80x9c83Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:48:55.339243889 CEST192.168.2.38.8.4.40x62eeStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:48:55.504285097 CEST192.168.2.38.8.8.80xc4bdStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:48:59.616060019 CEST192.168.2.38.8.8.80xe6d2Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:04.839395046 CEST192.168.2.38.8.8.80xdf04Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:10.071288109 CEST192.168.2.38.8.8.80xb5c1Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:15.360275030 CEST192.168.2.38.8.8.80xd49cStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:15.408368111 CEST192.168.2.38.8.4.40xced3Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:15.927696943 CEST192.168.2.38.8.8.80xfbfbStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:20.106766939 CEST192.168.2.38.8.8.80x1a3aStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:20.180037022 CEST192.168.2.38.8.4.40x1c99Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:20.445542097 CEST192.168.2.38.8.8.80x2e3dStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:24.537130117 CEST192.168.2.38.8.8.80xbd14Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:24.583209038 CEST192.168.2.38.8.4.40x4ec6Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:24.668420076 CEST192.168.2.38.8.8.80xb5cdStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:28.791361094 CEST192.168.2.38.8.8.80x1c05Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:34.405328989 CEST192.168.2.38.8.8.80x3c9aStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:39.757822990 CEST192.168.2.38.8.8.80xe0fdStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:45.137665987 CEST192.168.2.38.8.8.80xacaaStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:45.314492941 CEST192.168.2.38.8.4.40xcd5eStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:45.404165030 CEST192.168.2.38.8.8.80xa24dStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:49.507503986 CEST192.168.2.38.8.8.80x4193Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:49.654870033 CEST192.168.2.38.8.4.40x4bedStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:49.770097017 CEST192.168.2.38.8.8.80x1078Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:53.939744949 CEST192.168.2.38.8.8.80xee6dStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:53.990129948 CEST192.168.2.38.8.4.40xa85Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:54.121324062 CEST192.168.2.38.8.8.80x1e1Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:58.202971935 CEST192.168.2.38.8.8.80x69eaStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:50:03.425534964 CEST192.168.2.38.8.8.80x6344Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:50:08.665294886 CEST192.168.2.38.8.8.80x5e12Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)

                                                                                DNS Answers

                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                Jun 9, 2021 08:48:30.474170923 CEST8.8.8.8192.168.2.30x6606No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:48:35.807027102 CEST8.8.8.8192.168.2.30xd85bNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:48:41.179805994 CEST8.8.8.8192.168.2.30xb68cNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:48:59.659225941 CEST8.8.8.8192.168.2.30xe6d2No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:04.882405996 CEST8.8.8.8192.168.2.30xdf04No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:10.115674973 CEST8.8.8.8192.168.2.30xb5c1No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:28.834433079 CEST8.8.8.8192.168.2.30x1c05No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:34.447954893 CEST8.8.8.8192.168.2.30x3c9aNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:39.803596020 CEST8.8.8.8192.168.2.30xe0fdNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:49:58.247427940 CEST8.8.8.8192.168.2.30x69eaNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:50:03.472016096 CEST8.8.8.8192.168.2.30x6344No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 9, 2021 08:50:08.709853888 CEST8.8.8.8192.168.2.30x5e12No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)

                                                                                Code Manipulations

                                                                                Statistics

                                                                                Behavior

                                                                                Click to jump to process

                                                                                System Behavior

                                                                                General

                                                                                Start time:08:47:59
                                                                                Start date:09/06/2021
                                                                                Path:C:\Users\user\Desktop\kyIfnzzg3E.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\Desktop\kyIfnzzg3E.exe'
                                                                                Imagebase:0x1d0000
                                                                                File size:734208 bytes
                                                                                MD5 hash:EB43B3C033BD76B51B90A51A6726A81C
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.250699387.00000000001D2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.251456849.0000000002561000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.252649732.00000000037D6000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.252649732.00000000037D6000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.252649732.00000000037D6000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000000.194675696.00000000001D2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.251887619.0000000003645000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.251887619.0000000003645000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.251887619.0000000003645000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.251765887.0000000003561000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.251765887.0000000003561000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.251765887.0000000003561000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                Reputation:low

                                                                                General

                                                                                Start time:08:48:24
                                                                                Start date:09/06/2021
                                                                                Path:C:\Users\user\AppData\Local\Temp\RegAsm.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Users\user\AppData\Local\Temp\RegAsm.exe
                                                                                Imagebase:0xa0000
                                                                                File size:64616 bytes
                                                                                MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Antivirus matches:
                                                                                • Detection: 0%, Metadefender, Browse
                                                                                • Detection: 0%, ReversingLabs
                                                                                Reputation:high

                                                                                General

                                                                                Start time:08:48:24
                                                                                Start date:09/06/2021
                                                                                Path:C:\Users\user\AppData\Local\Temp\RegAsm.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Users\user\AppData\Local\Temp\RegAsm.exe
                                                                                Imagebase:0xbf0000
                                                                                File size:64616 bytes
                                                                                MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.461789098.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.461789098.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.461789098.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.249612191.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.249612191.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.249612191.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.249317743.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.249317743.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.249317743.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                Reputation:high

                                                                                Disassembly

                                                                                Code Analysis

                                                                                Reset < >