Loading ...

Play interactive tourEdit tour

Analysis Report ws8W4yPAvg.exe

Overview

General Information

Sample Name:ws8W4yPAvg.exe
Analysis ID:433429
MD5:4f777ac67c52be4d6a8b6f125bc94661
SHA1:f4fe647fa467ba0d039f9ca61bc18583734f7b46
SHA256:d112e19d34e88c040a70367143569c965cb48dbb1fa36579838c51f8ca9ebe7c
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • ws8W4yPAvg.exe (PID: 4088 cmdline: 'C:\Users\user\Desktop\ws8W4yPAvg.exe' MD5: 4F777AC67C52BE4D6A8B6F125BC94661)
    • schtasks.exe (PID: 5292 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpEFD2.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 3708 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpFE1B.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • ws8W4yPAvg.exe (PID: 3012 cmdline: C:\Users\user\Desktop\ws8W4yPAvg.exe 0 MD5: 4F777AC67C52BE4D6A8B6F125BC94661)
  • dhcpmon.exe (PID: 3216 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 4F777AC67C52BE4D6A8B6F125BC94661)
  • dhcpmon.exe (PID: 3528 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 4F777AC67C52BE4D6A8B6F125BC94661)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "c01ec2cb-25ef-4fd8-a41e-f0012551", "Group": "Default", "Domain1": "4.tcp.ngrok.io", "Domain2": "127.0.0.1", "Port": 10877, "RunOnStartup": "Enable", "RequestElevation": "Enable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Enable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Enable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
ws8W4yPAvg.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1018d:$x1: NanoCore.ClientPluginHost
  • 0x101ca:$x2: IClientNetworkHost
  • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
ws8W4yPAvg.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xff05:$x1: NanoCore Client.exe
  • 0x1018d:$x2: NanoCore.ClientPluginHost
  • 0x117c6:$s1: PluginCommand
  • 0x117ba:$s2: FileCommand
  • 0x1266b:$s3: PipeExists
  • 0x18422:$s4: PipeCreated
  • 0x101b7:$s5: IClientLoggingHost
ws8W4yPAvg.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    ws8W4yPAvg.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfef5:$a: NanoCore
    • 0xff05:$a: NanoCore
    • 0x10139:$a: NanoCore
    • 0x1014d:$a: NanoCore
    • 0x1018d:$a: NanoCore
    • 0xff54:$b: ClientPlugin
    • 0x10156:$b: ClientPlugin
    • 0x10196:$b: ClientPlugin
    • 0x1007b:$c: ProjectData
    • 0x10a82:$d: DESCrypto
    • 0x1844e:$e: KeepAlive
    • 0x1643c:$g: LogClientMessage
    • 0x12637:$i: get_Connected
    • 0x10db8:$j: #=q
    • 0x10de8:$j: #=q
    • 0x10e04:$j: #=q
    • 0x10e34:$j: #=q
    • 0x10e50:$j: #=q
    • 0x10e6c:$j: #=q
    • 0x10e9c:$j: #=q
    • 0x10eb8:$j: #=q

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xff05:$x1: NanoCore Client.exe
    • 0x1018d:$x2: NanoCore.ClientPluginHost
    • 0x117c6:$s1: PluginCommand
    • 0x117ba:$s2: FileCommand
    • 0x1266b:$s3: PipeExists
    • 0x18422:$s4: PipeCreated
    • 0x101b7:$s5: IClientLoggingHost
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x1007b:$c: ProjectData
      • 0x10a82:$d: DESCrypto
      • 0x1844e:$e: KeepAlive
      • 0x1643c:$g: LogClientMessage
      • 0x12637:$i: get_Connected
      • 0x10db8:$j: #=q
      • 0x10de8:$j: #=q
      • 0x10e04:$j: #=q
      • 0x10e34:$j: #=q
      • 0x10e50:$j: #=q
      • 0x10e6c:$j: #=q
      • 0x10e9c:$j: #=q
      • 0x10eb8:$j: #=q

      Memory Dumps

      SourceRuleDescriptionAuthorStrings
      00000005.00000002.223088157.0000000000052000.00000002.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xff8d:$x1: NanoCore.ClientPluginHost
      • 0xffca:$x2: IClientNetworkHost
      • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      00000005.00000002.223088157.0000000000052000.00000002.00020000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        00000005.00000002.223088157.0000000000052000.00000002.00020000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfcf5:$a: NanoCore
        • 0xfd05:$a: NanoCore
        • 0xff39:$a: NanoCore
        • 0xff4d:$a: NanoCore
        • 0xff8d:$a: NanoCore
        • 0xfd54:$b: ClientPlugin
        • 0xff56:$b: ClientPlugin
        • 0xff96:$b: ClientPlugin
        • 0xfe7b:$c: ProjectData
        • 0x10882:$d: DESCrypto
        • 0x1824e:$e: KeepAlive
        • 0x1623c:$g: LogClientMessage
        • 0x12437:$i: get_Connected
        • 0x10bb8:$j: #=q
        • 0x10be8:$j: #=q
        • 0x10c04:$j: #=q
        • 0x10c34:$j: #=q
        • 0x10c50:$j: #=q
        • 0x10c6c:$j: #=q
        • 0x10c9c:$j: #=q
        • 0x10cb8:$j: #=q
        00000000.00000002.464501359.0000000000062000.00000002.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xff8d:$x1: NanoCore.ClientPluginHost
        • 0xffca:$x2: IClientNetworkHost
        • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        00000000.00000002.464501359.0000000000062000.00000002.00020000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          Click to see the 43 entries

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          8.0.dhcpmon.exe.c0000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x1018d:$x1: NanoCore.ClientPluginHost
          • 0x101ca:$x2: IClientNetworkHost
          • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          8.0.dhcpmon.exe.c0000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0xff05:$x1: NanoCore Client.exe
          • 0x1018d:$x2: NanoCore.ClientPluginHost
          • 0x117c6:$s1: PluginCommand
          • 0x117ba:$s2: FileCommand
          • 0x1266b:$s3: PipeExists
          • 0x18422:$s4: PipeCreated
          • 0x101b7:$s5: IClientLoggingHost
          8.0.dhcpmon.exe.c0000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
            8.0.dhcpmon.exe.c0000.0.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
            • 0xfef5:$a: NanoCore
            • 0xff05:$a: NanoCore
            • 0x10139:$a: NanoCore
            • 0x1014d:$a: NanoCore
            • 0x1018d:$a: NanoCore
            • 0xff54:$b: ClientPlugin
            • 0x10156:$b: ClientPlugin
            • 0x10196:$b: ClientPlugin
            • 0x1007b:$c: ProjectData
            • 0x10a82:$d: DESCrypto
            • 0x1844e:$e: KeepAlive
            • 0x1643c:$g: LogClientMessage
            • 0x12637:$i: get_Connected
            • 0x10db8:$j: #=q
            • 0x10de8:$j: #=q
            • 0x10e04:$j: #=q
            • 0x10e34:$j: #=q
            • 0x10e50:$j: #=q
            • 0x10e6c:$j: #=q
            • 0x10e9c:$j: #=q
            • 0x10eb8:$j: #=q
            7.2.dhcpmon.exe.390000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
            • 0x1018d:$x1: NanoCore.ClientPluginHost
            • 0x101ca:$x2: IClientNetworkHost
            • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
            Click to see the 72 entries

            Sigma Overview

            AV Detection:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ws8W4yPAvg.exe, ProcessId: 4088, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            E-Banking Fraud:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ws8W4yPAvg.exe, ProcessId: 4088, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Stealing of Sensitive Information:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ws8W4yPAvg.exe, ProcessId: 4088, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Remote Access Functionality:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ws8W4yPAvg.exe, ProcessId: 4088, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: ws8W4yPAvg.exeAvira: detected
            Antivirus detection for dropped fileShow sources
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen7
            Found malware configurationShow sources
            Source: 00000008.00000002.239146095.00000000036A1000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "c01ec2cb-25ef-4fd8-a41e-f0012551", "Group": "Default", "Domain1": "4.tcp.ngrok.io", "Domain2": "127.0.0.1", "Port": 10877, "RunOnStartup": "Enable", "RequestElevation": "Enable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Enable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Enable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
            Multi AV Scanner detection for domain / URLShow sources
            Source: 4.tcp.ngrok.ioVirustotal: Detection: 12%Perma Link
            Source: 4.tcp.ngrok.ioVirustotal: Detection: 12%Perma Link
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: ws8W4yPAvg.exe, type: SAMPLE
            Source: Yara matchFile source: 00000005.00000002.223088157.0000000000052000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.464501359.0000000000062000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.239146095.00000000036A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.238181318.00000000000C2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.224117894.00000000038B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.222145161.00000000000C2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.224074695.00000000028B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.209534119.0000000000052000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000000.214551753.0000000000392000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.229264984.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.198429567.0000000000062000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.239109730.00000000026A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.229298937.00000000039E1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.228024538.0000000000392000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3528, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3216, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: ws8W4yPAvg.exe PID: 3012, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: ws8W4yPAvg.exe PID: 4088, type: MEMORY
            Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
            Source: Yara matchFile source: 8.0.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.0.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.36eeaac.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.39030d5.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.36e9c76.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.38feaac.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.38feaac.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.3a2eaac.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.3a29c76.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.3a2eaac.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.36f30d5.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.36eeaac.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.3a330d5.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.38f9c76.2.raw.unpack, type: UNPACKEDPE
            Machine Learning detection for dropped fileShow sources
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
            Machine Learning detection for sampleShow sources
            Source: ws8W4yPAvg.exeJoe Sandbox ML: detected
            Source: 5.0.ws8W4yPAvg.exe.50000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 7.0.dhcpmon.exe.390000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 8.0.dhcpmon.exe.c0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 7.2.dhcpmon.exe.390000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 8.2.dhcpmon.exe.c0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 5.2.ws8W4yPAvg.exe.50000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 0.2.ws8W4yPAvg.exe.60000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 0.0.ws8W4yPAvg.exe.60000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: ws8W4yPAvg.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49720 -> 3.133.207.110:10877
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49724 -> 3.133.207.110:10877
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49728 -> 3.133.207.110:10877
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49738 -> 3.133.207.110:10877
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49739 -> 3.133.207.110:10877
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49740 -> 3.133.207.110:10877
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49750 -> 3.22.15.135:10877
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49756 -> 3.133.207.110:10877
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49757 -> 3.22.15.135:10877
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49761 -> 3.131.147.49:10877
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49764 -> 3.22.15.135:10877
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49765 -> 3.131.147.49:10877
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49769 -> 3.138.180.119:10877
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49770 -> 3.138.180.119:10877
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: 4.tcp.ngrok.io
            Source: Malware configuration extractorURLs: 127.0.0.1
            Source: global trafficTCP traffic: 192.168.2.3:49720 -> 3.133.207.110:10877
            Source: global trafficTCP traffic: 192.168.2.3:49750 -> 3.22.15.135:10877
            Source: global trafficTCP traffic: 192.168.2.3:49761 -> 3.131.147.49:10877
            Source: Joe Sandbox ViewIP Address: 3.131.147.49 3.131.147.49
            Source: Joe Sandbox ViewIP Address: 3.133.207.110 3.133.207.110
            Source: Joe Sandbox ViewIP Address: 3.22.15.135 3.22.15.135
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: unknownDNS traffic detected: queries for: 4.tcp.ngrok.io
            Source: ws8W4yPAvg.exe, 00000000.00000002.466472701.00000000007EA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
            Source: ws8W4yPAvg.exe, 00000005.00000002.224117894.00000000038B1000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

            E-Banking Fraud:

            barindex
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: ws8W4yPAvg.exe, type: SAMPLE
            Source: Yara matchFile source: 00000005.00000002.223088157.0000000000052000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.464501359.0000000000062000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.239146095.00000000036A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.238181318.00000000000C2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.224117894.00000000038B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.222145161.00000000000C2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.224074695.00000000028B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.209534119.0000000000052000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000000.214551753.0000000000392000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.229264984.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.198429567.0000000000062000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.239109730.00000000026A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.229298937.00000000039E1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.228024538.0000000000392000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3528, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3216, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: ws8W4yPAvg.exe PID: 3012, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: ws8W4yPAvg.exe PID: 4088, type: MEMORY
            Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
            Source: Yara matchFile source: 8.0.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.0.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.36eeaac.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.39030d5.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.36e9c76.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.38feaac.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.38feaac.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.3a2eaac.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.3a29c76.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.3a2eaac.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.36f30d5.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.36eeaac.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.3a330d5.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.38f9c76.2.raw.unpack, type: UNPACKEDPE

            Operating System Destruction:

            barindex
            Protects its processes via BreakOnTermination flagShow sources
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: 01 00 00 00

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: ws8W4yPAvg.exe, type: SAMPLEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: ws8W4yPAvg.exe, type: SAMPLEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000005.00000002.223088157.0000000000052000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000005.00000002.223088157.0000000000052000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000002.464501359.0000000000062000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000000.00000002.464501359.0000000000062000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000008.00000002.239146095.00000000036A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000008.00000002.238181318.00000000000C2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000008.00000002.238181318.00000000000C2000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000005.00000002.224117894.00000000038B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000008.00000000.222145161.00000000000C2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000008.00000000.222145161.00000000000C2000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000005.00000002.224074695.00000000028B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000005.00000000.209534119.0000000000052000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000005.00000000.209534119.0000000000052000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000007.00000000.214551753.0000000000392000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000007.00000000.214551753.0000000000392000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000007.00000002.229264984.00000000029E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000000.198429567.0000000000062000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000000.00000000.198429567.0000000000062000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000008.00000002.239109730.00000000026A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000007.00000002.229298937.00000000039E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000007.00000002.228024538.0000000000392000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000007.00000002.228024538.0000000000392000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: dhcpmon.exe PID: 3528, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: dhcpmon.exe PID: 3528, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: dhcpmon.exe PID: 3216, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: dhcpmon.exe PID: 3216, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: ws8W4yPAvg.exe PID: 3012, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: ws8W4yPAvg.exe PID: 3012, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: ws8W4yPAvg.exe PID: 4088, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: ws8W4yPAvg.exe PID: 4088, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 8.0.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 8.0.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 7.2.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 7.2.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 7.0.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 7.0.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 8.2.dhcpmon.exe.36eeaac.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.0.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.0.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 5.2.ws8W4yPAvg.exe.39030d5.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 8.2.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 8.2.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 8.2.dhcpmon.exe.36e9c76.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 8.2.dhcpmon.exe.36e9c76.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 5.2.ws8W4yPAvg.exe.38feaac.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.2.ws8W4yPAvg.exe.38feaac.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.2.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.2.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 7.2.dhcpmon.exe.3a2eaac.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 7.2.dhcpmon.exe.3a29c76.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 7.2.dhcpmon.exe.3a29c76.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 7.2.dhcpmon.exe.2a03dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 7.2.dhcpmon.exe.3a2eaac.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 8.2.dhcpmon.exe.36f30d5.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 8.2.dhcpmon.exe.36eeaac.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.2.ws8W4yPAvg.exe.28d3b90.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 8.2.dhcpmon.exe.26c3dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.0.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.0.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 7.2.dhcpmon.exe.3a330d5.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.2.ws8W4yPAvg.exe.38f9c76.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.2.ws8W4yPAvg.exe.38f9c76.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeCode function: 0_2_0006524A
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeCode function: 5_2_0005524A
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeCode function: 5_2_00AE2FA8
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeCode function: 5_2_00AE23A0
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeCode function: 5_2_00AE3850
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeCode function: 5_2_00AE306F
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 7_2_0039524A
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 7_2_00DC2FA8
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 7_2_00DC23A0
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 7_2_00DC3850
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 7_2_00DC306F
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_000C524A
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_048F2FA8
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_048F23A0
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_048F3850
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_048F32BB
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_048F306F
            Source: ws8W4yPAvg.exe, 00000000.00000002.466472701.00000000007EA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs ws8W4yPAvg.exe
            Source: ws8W4yPAvg.exe, 00000005.00000002.223440420.000000000082A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs ws8W4yPAvg.exe
            Source: ws8W4yPAvg.exe, 00000005.00000002.224117894.00000000038B1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs ws8W4yPAvg.exe
            Source: ws8W4yPAvg.exe, 00000005.00000002.224117894.00000000038B1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs ws8W4yPAvg.exe
            Source: ws8W4yPAvg.exe, 00000005.00000002.224117894.00000000038B1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs ws8W4yPAvg.exe
            Source: ws8W4yPAvg.exe, 00000005.00000002.224417602.0000000004AA0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs ws8W4yPAvg.exe
            Source: ws8W4yPAvg.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: ws8W4yPAvg.exe, type: SAMPLEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: ws8W4yPAvg.exe, type: SAMPLEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: ws8W4yPAvg.exe, type: SAMPLEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000005.00000002.223088157.0000000000052000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000005.00000002.223088157.0000000000052000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000000.00000002.464501359.0000000000062000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000000.00000002.464501359.0000000000062000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000008.00000002.239146095.00000000036A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000008.00000002.238181318.00000000000C2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000008.00000002.238181318.00000000000C2000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000005.00000002.224117894.00000000038B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000008.00000000.222145161.00000000000C2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000008.00000000.222145161.00000000000C2000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000005.00000002.224074695.00000000028B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000005.00000000.209534119.0000000000052000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000005.00000000.209534119.0000000000052000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000007.00000000.214551753.0000000000392000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000007.00000000.214551753.0000000000392000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000007.00000002.229264984.00000000029E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000000.00000000.198429567.0000000000062000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000000.00000000.198429567.0000000000062000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000008.00000002.239109730.00000000026A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000007.00000002.229298937.00000000039E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000007.00000002.228024538.0000000000392000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000007.00000002.228024538.0000000000392000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: dhcpmon.exe PID: 3528, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: dhcpmon.exe PID: 3528, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: dhcpmon.exe PID: 3216, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: dhcpmon.exe PID: 3216, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: ws8W4yPAvg.exe PID: 3012, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: ws8W4yPAvg.exe PID: 3012, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: ws8W4yPAvg.exe PID: 4088, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: ws8W4yPAvg.exe PID: 4088, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 8.0.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 8.0.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 8.0.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 7.2.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 7.2.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 7.2.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 7.0.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 7.0.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 7.0.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 8.2.dhcpmon.exe.36eeaac.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 8.2.dhcpmon.exe.36eeaac.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.0.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.0.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.0.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 5.2.ws8W4yPAvg.exe.39030d5.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.ws8W4yPAvg.exe.39030d5.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 8.2.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 8.2.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 8.2.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 8.2.dhcpmon.exe.36e9c76.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 8.2.dhcpmon.exe.36e9c76.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 8.2.dhcpmon.exe.36e9c76.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 5.2.ws8W4yPAvg.exe.38feaac.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.ws8W4yPAvg.exe.38feaac.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.ws8W4yPAvg.exe.38feaac.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.ws8W4yPAvg.exe.38feaac.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 7.2.dhcpmon.exe.3a2eaac.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 7.2.dhcpmon.exe.3a2eaac.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 7.2.dhcpmon.exe.3a29c76.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 7.2.dhcpmon.exe.3a29c76.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 7.2.dhcpmon.exe.3a29c76.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 7.2.dhcpmon.exe.2a03dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 7.2.dhcpmon.exe.2a03dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 7.2.dhcpmon.exe.3a2eaac.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 7.2.dhcpmon.exe.3a2eaac.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 8.2.dhcpmon.exe.36f30d5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 8.2.dhcpmon.exe.36f30d5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 8.2.dhcpmon.exe.36eeaac.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 8.2.dhcpmon.exe.36eeaac.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.ws8W4yPAvg.exe.28d3b90.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.ws8W4yPAvg.exe.28d3b90.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 8.2.dhcpmon.exe.26c3dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 8.2.dhcpmon.exe.26c3dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.0.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.0.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.0.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 7.2.dhcpmon.exe.3a330d5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 7.2.dhcpmon.exe.3a330d5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.ws8W4yPAvg.exe.38f9c76.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.ws8W4yPAvg.exe.38f9c76.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.ws8W4yPAvg.exe.38f9c76.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: ws8W4yPAvg.exeStatic PE information: Section: .rsrc ZLIB complexity 1.00012207031
            Source: dhcpmon.exe.0.drStatic PE information: Section: .rsrc ZLIB complexity 1.00012207031
            Source: ws8W4yPAvg.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: ws8W4yPAvg.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
            Source: ws8W4yPAvg.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
            Source: dhcpmon.exe.0.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
            Source: dhcpmon.exe.0.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
            Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
            Source: 7.2.dhcpmon.exe.390000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 7.2.dhcpmon.exe.390000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 8.2.dhcpmon.exe.c0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 8.2.dhcpmon.exe.c0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: ws8W4yPAvg.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: ws8W4yPAvg.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 8.0.dhcpmon.exe.c0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 8.0.dhcpmon.exe.c0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 7.0.dhcpmon.exe.390000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 7.0.dhcpmon.exe.390000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.0.ws8W4yPAvg.exe.60000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 0.0.ws8W4yPAvg.exe.60000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 5.2.ws8W4yPAvg.exe.50000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 5.2.ws8W4yPAvg.exe.50000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 5.0.ws8W4yPAvg.exe.50000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 5.0.ws8W4yPAvg.exe.50000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: classification engineClassification label: mal100.troj.evad.winEXE@10/8@14/5
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeFile created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9AJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6096:120:WilError_01
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5396:120:WilError_01
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{c01ec2cb-25ef-4fd8-a41e-f0012551a6da}
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEFD2.tmpJump to behavior
            Source: ws8W4yPAvg.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeFile read: C:\Users\user\Desktop\ws8W4yPAvg.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\ws8W4yPAvg.exe 'C:\Users\user\Desktop\ws8W4yPAvg.exe'
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpEFD2.tmp'
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpFE1B.tmp'
            Source: unknownProcess created: C:\Users\user\Desktop\ws8W4yPAvg.exe C:\Users\user\Desktop\ws8W4yPAvg.exe 0
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
            Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpEFD2.tmp'
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpFE1B.tmp'
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
            Source: ws8W4yPAvg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll

            Data Obfuscation:

            barindex
            .NET source code contains potential unpackerShow sources
            Source: ws8W4yPAvg.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: ws8W4yPAvg.exe, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: dhcpmon.exe.0.dr, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.0.ws8W4yPAvg.exe.60000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.0.ws8W4yPAvg.exe.60000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 5.0.ws8W4yPAvg.exe.50000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 5.0.ws8W4yPAvg.exe.50000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 5.2.ws8W4yPAvg.exe.50000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 5.2.ws8W4yPAvg.exe.50000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 7.0.dhcpmon.exe.390000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 7.0.dhcpmon.exe.390000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 7.2.dhcpmon.exe.390000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 7.2.dhcpmon.exe.390000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 8.0.dhcpmon.exe.c0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 8.0.dhcpmon.exe.c0000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 8.2.dhcpmon.exe.c0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 8.2.dhcpmon.exe.c0000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeCode function: 0_2_00759D74 push 780075CBh; retf
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeCode function: 0_2_007574B8 push ebp; ret
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeCode function: 0_2_007574AC push ecx; ret
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeCode function: 0_2_007598AB push ecx; retf 0075h
            Source: ws8W4yPAvg.exe, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: ws8W4yPAvg.exe, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: dhcpmon.exe.0.dr, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: dhcpmon.exe.0.dr, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 0.0.ws8W4yPAvg.exe.60000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 0.0.ws8W4yPAvg.exe.60000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 5.0.ws8W4yPAvg.exe.50000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 5.0.ws8W4yPAvg.exe.50000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 5.2.ws8W4yPAvg.exe.50000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 5.2.ws8W4yPAvg.exe.50000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 7.0.dhcpmon.exe.390000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 7.0.dhcpmon.exe.390000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 7.2.dhcpmon.exe.390000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 7.2.dhcpmon.exe.390000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 8.0.dhcpmon.exe.c0000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 8.0.dhcpmon.exe.c0000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 8.2.dhcpmon.exe.c0000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 8.2.dhcpmon.exe.c0000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

            Boot Survival:

            barindex
            Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpEFD2.tmp'

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeFile opened: C:\Users\user\Desktop\ws8W4yPAvg.exe:Zone.Identifier read attributes | delete
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeWindow / User API: foregroundWindowGot 958
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exe TID: 3088Thread sleep time: -1844674407370954s >= -30000s
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exe TID: 3468Thread sleep time: -560000s >= -30000s
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exe TID: 4608Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 676Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5404Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: ws8W4yPAvg.exe, 00000000.00000003.268517995.0000000000873000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllj%
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeMemory allocated: page read and write | page guard
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpEFD2.tmp'
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpFE1B.tmp'
            Source: ws8W4yPAvg.exe, 00000000.00000003.268510228.000000000086B000.00000004.00000001.sdmpBinary or memory string: Program Manager(
            Source: ws8W4yPAvg.exe, 00000000.00000003.244143503.00000000008BA000.00000004.00000001.sdmpBinary or memory string: Program Manager
            Source: ws8W4yPAvg.exe, 00000000.00000003.407240146.00000000008B9000.00000004.00000001.sdmpBinary or memory string: Program Managerd
            Source: ws8W4yPAvg.exe, 00000000.00000003.244143503.00000000008BA000.00000004.00000001.sdmpBinary or memory string: Program Managert$
            Source: ws8W4yPAvg.exe, 00000000.00000003.417129629.0000000000894000.00000004.00000001.sdmpBinary or memory string: Program Managerz
            Source: C:\Users\user\Desktop\ws8W4yPAvg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: ws8W4yPAvg.exe, type: SAMPLE
            Source: Yara matchFile source: 00000005.00000002.223088157.0000000000052000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.464501359.0000000000062000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.239146095.00000000036A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.238181318.00000000000C2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.224117894.00000000038B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.222145161.00000000000C2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.224074695.00000000028B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.209534119.0000000000052000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000000.214551753.0000000000392000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.229264984.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.198429567.0000000000062000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.239109730.00000000026A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.229298937.00000000039E1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.228024538.0000000000392000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3528, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3216, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: ws8W4yPAvg.exe PID: 3012, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: ws8W4yPAvg.exe PID: 4088, type: MEMORY
            Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
            Source: Yara matchFile source: 8.0.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.0.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.36eeaac.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.39030d5.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.36e9c76.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.38feaac.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.38feaac.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.3a2eaac.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.3a29c76.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.3a2eaac.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.36f30d5.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.36eeaac.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.3a330d5.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.38f9c76.2.raw.unpack, type: UNPACKEDPE

            Remote Access Functionality:

            barindex
            Detected Nanocore RatShow sources
            Source: ws8W4yPAvg.exeString found in binary or memory: NanoCore.ClientPluginHost
            Source: ws8W4yPAvg.exeString found in binary or memory: NanoCore.ClientPluginHost
            Source: ws8W4yPAvg.exe, 00000005.00000002.224117894.00000000038B1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: dhcpmon.exeString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 00000007.00000002.229264984.00000000029E1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: dhcpmon.exeString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 00000008.00000002.239146095.00000000036A1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: ws8W4yPAvg.exeString found in binary or memory: NanoCore.ClientPluginHost
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: ws8W4yPAvg.exe, type: SAMPLE
            Source: Yara matchFile source: 00000005.00000002.223088157.0000000000052000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.464501359.0000000000062000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.239146095.00000000036A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.238181318.00000000000C2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.224117894.00000000038B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.222145161.00000000000C2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.224074695.00000000028B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.209534119.0000000000052000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000000.214551753.0000000000392000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.229264984.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.198429567.0000000000062000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.239109730.00000000026A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.229298937.00000000039E1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.228024538.0000000000392000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3528, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3216, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: ws8W4yPAvg.exe PID: 3012, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: ws8W4yPAvg.exe PID: 4088, type: MEMORY
            Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
            Source: Yara matchFile source: 8.0.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.0.dhcpmon.exe.390000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.36eeaac.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.39030d5.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.36e9c76.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.38feaac.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.38feaac.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.3a2eaac.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.3a29c76.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.3a2eaac.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.36f30d5.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.dhcpmon.exe.36eeaac.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.ws8W4yPAvg.exe.60000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.dhcpmon.exe.3a330d5.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.ws8W4yPAvg.exe.38f9c76.2.raw.unpack, type: UNPACKEDPE

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection12Masquerading2Input Capture21Security Software Discovery1Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Information Discovery2SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing12Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 433429 Sample: ws8W4yPAvg.exe Startdate: 11/06/2021 Architecture: WINDOWS Score: 100 39 4.tcp.ngrok.io 2->39 47 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->47 49 Multi AV Scanner detection for domain / URL 2->49 51 Found malware configuration 2->51 53 10 other signatures 2->53 8 ws8W4yPAvg.exe 1 14 2->8         started        13 ws8W4yPAvg.exe 3 2->13         started        15 dhcpmon.exe 3 2->15         started        17 dhcpmon.exe 2 2->17         started        signatures3 process4 dnsIp5 41 3.131.147.49, 10877, 49761, 49765 AMAZON-02US United States 8->41 43 4.tcp.ngrok.io 3.133.207.110, 10877, 49720, 49724 AMAZON-02US United States 8->43 45 3 other IPs or domains 8->45 27 C:\Program Files (x86)\...\dhcpmon.exe, PE32 8->27 dropped 29 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 8->29 dropped 31 C:\Users\user\AppData\Local\...\tmpEFD2.tmp, XML 8->31 dropped 33 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 8->33 dropped 55 Protects its processes via BreakOnTermination flag 8->55 57 Uses schtasks.exe or at.exe to add and modify task schedules 8->57 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 8->59 19 schtasks.exe 1 8->19         started        21 schtasks.exe 1 8->21         started        35 C:\Users\user\AppData\...\ws8W4yPAvg.exe.log, ASCII 13->35 dropped 37 C:\Users\user\AppData\...\dhcpmon.exe.log, ASCII 15->37 dropped file6 signatures7 process8 process9 23 conhost.exe 19->23         started        25 conhost.exe 21->25         started       

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            ws8W4yPAvg.exe100%AviraTR/Dropper.MSIL.Gen7
            ws8W4yPAvg.exe100%Joe Sandbox ML

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%AviraTR/Dropper.MSIL.Gen7
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            5.0.ws8W4yPAvg.exe.50000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            7.0.dhcpmon.exe.390000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            8.0.dhcpmon.exe.c0000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            7.2.dhcpmon.exe.390000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            8.2.dhcpmon.exe.c0000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            5.2.ws8W4yPAvg.exe.50000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            0.2.ws8W4yPAvg.exe.60000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            0.0.ws8W4yPAvg.exe.60000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

            Domains

            SourceDetectionScannerLabelLink
            4.tcp.ngrok.io12%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            4.tcp.ngrok.io12%VirustotalBrowse
            4.tcp.ngrok.io0%Avira URL Cloudsafe
            127.0.0.10%VirustotalBrowse
            127.0.0.10%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            4.tcp.ngrok.io
            3.133.207.110
            truetrueunknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            4.tcp.ngrok.iotrue
            • 12%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            127.0.0.1true
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            3.131.147.49
            unknownUnited States
            16509AMAZON-02UStrue
            3.133.207.110
            4.tcp.ngrok.ioUnited States
            16509AMAZON-02UStrue
            3.22.15.135
            unknownUnited States
            16509AMAZON-02UStrue

            Private

            IP
            192.168.2.1
            127.0.0.1

            General Information

            Joe Sandbox Version:32.0.0 Black Diamond
            Analysis ID:433429
            Start date:11.06.2021
            Start time:19:57:10
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 9m 15s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:ws8W4yPAvg.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:29
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@10/8@14/5
            EGA Information:Failed
            HDC Information:Failed
            HCA Information:
            • Successful, ratio: 99%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            Warnings:
            Show All
            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
            • TCP Packets have been reduced to 100
            • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
            • Excluded IPs from analysis (whitelisted): 13.64.90.137, 104.43.139.144, 20.82.210.154, 184.30.20.56, 20.54.26.129, 2.20.142.209, 2.20.142.210, 93.184.221.240, 20.82.209.104, 92.122.213.247, 92.122.213.194, 20.50.102.62
            • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, iris-de-ppe-azsc-neu.northeurope.cloudapp.azure.com, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, wu.wpc.apr-52dd2.edgecastdns.net, au-bg-shim.trafficmanager.net, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, wu.ec.azureedge.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            19:57:58AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
            19:58:01Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\ws8W4yPAvg.exe" s>$(Arg0)
            19:58:02API Interceptor990x Sleep call for process: ws8W4yPAvg.exe modified
            19:58:03Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            3.131.147.49FiYBg9R8m0.exeGet hashmaliciousBrowse
              ooAUh9ba7E.exeGet hashmaliciousBrowse
                A6FAm1ae1j.exeGet hashmaliciousBrowse
                  vZvmgrCXam.exeGet hashmaliciousBrowse
                    63C2AB0ECE24B47CDCFE2128789214F87451A3D82D641.exeGet hashmaliciousBrowse
                      DC8DDCD4DB035FA647001A01CAB6A2866D092FCAAD182.exeGet hashmaliciousBrowse
                        tmkfdBpwAx.exeGet hashmaliciousBrowse
                          LGKacQbjeH.exeGet hashmaliciousBrowse
                            qiCot2DU55.exeGet hashmaliciousBrowse
                              YZJfsPAFBJ.exeGet hashmaliciousBrowse
                                T91uHSVq.exeGet hashmaliciousBrowse
                                  aYqoy7xF7y.exeGet hashmaliciousBrowse
                                    Krtw4Kl87V.exeGet hashmaliciousBrowse
                                      YFZX6dTsiT.exeGet hashmaliciousBrowse
                                        vzcJbGFs.exeGet hashmaliciousBrowse
                                          rQMm2jZD.exeGet hashmaliciousBrowse
                                            PsbfBdoToY.exeGet hashmaliciousBrowse
                                              BcaDguoEzV.exeGet hashmaliciousBrowse
                                                eSJ6Q8F2.exeGet hashmaliciousBrowse
                                                  BwQRSJm1.exeGet hashmaliciousBrowse
                                                    3.133.207.110FiYBg9R8m0.exeGet hashmaliciousBrowse
                                                      BWAlL8lrQb.exeGet hashmaliciousBrowse
                                                        ooAUh9ba7E.exeGet hashmaliciousBrowse
                                                          A6FAm1ae1j.exeGet hashmaliciousBrowse
                                                            CpOFmSHBGH.exeGet hashmaliciousBrowse
                                                              63C2AB0ECE24B47CDCFE2128789214F87451A3D82D641.exeGet hashmaliciousBrowse
                                                                D3AAB88BB737961C971ED047B4C2D5B640EFF8E678781.exeGet hashmaliciousBrowse
                                                                  DC8DDCD4DB035FA647001A01CAB6A2866D092FCAAD182.exeGet hashmaliciousBrowse
                                                                    tmkfdBpwAx.exeGet hashmaliciousBrowse
                                                                      J6wDHe2QdA.exeGet hashmaliciousBrowse
                                                                        LGKacQbjeH.exeGet hashmaliciousBrowse
                                                                          qiCot2DU55.exeGet hashmaliciousBrowse
                                                                            YZJfsPAFBJ.exeGet hashmaliciousBrowse
                                                                              aYqoy7xF7y.exeGet hashmaliciousBrowse
                                                                                zOlLBCUG9R.exeGet hashmaliciousBrowse
                                                                                  YFZX6dTsiT.exeGet hashmaliciousBrowse
                                                                                    vzcJbGFs.exeGet hashmaliciousBrowse
                                                                                      rQMm2jZD.exeGet hashmaliciousBrowse
                                                                                        43SjNv5s.exeGet hashmaliciousBrowse
                                                                                          mNxVbma4uT.exeGet hashmaliciousBrowse
                                                                                            3.22.15.135ehDnx4Ke5d.exeGet hashmaliciousBrowse
                                                                                              BWAlL8lrQb.exeGet hashmaliciousBrowse
                                                                                                H4Q0I1RIuW.exeGet hashmaliciousBrowse
                                                                                                  ooAUh9ba7E.exeGet hashmaliciousBrowse
                                                                                                    CpOFmSHBGH.exeGet hashmaliciousBrowse
                                                                                                      GBtiwIB30h.exeGet hashmaliciousBrowse
                                                                                                        vZvmgrCXam.exeGet hashmaliciousBrowse
                                                                                                          D3AAB88BB737961C971ED047B4C2D5B640EFF8E678781.exeGet hashmaliciousBrowse
                                                                                                            DC8DDCD4DB035FA647001A01CAB6A2866D092FCAAD182.exeGet hashmaliciousBrowse
                                                                                                              tmkfdBpwAx.exeGet hashmaliciousBrowse
                                                                                                                J6wDHe2QdA.exeGet hashmaliciousBrowse
                                                                                                                  LGKacQbjeH.exeGet hashmaliciousBrowse
                                                                                                                    qiCot2DU55.exeGet hashmaliciousBrowse
                                                                                                                      YZJfsPAFBJ.exeGet hashmaliciousBrowse
                                                                                                                        TBjxmaP9.exeGet hashmaliciousBrowse
                                                                                                                          Krtw4Kl87V.exeGet hashmaliciousBrowse
                                                                                                                            YFZX6dTsiT.exeGet hashmaliciousBrowse
                                                                                                                              sz.exeGet hashmaliciousBrowse
                                                                                                                                vzcJbGFs.exeGet hashmaliciousBrowse
                                                                                                                                  mNxVbma4uT.exeGet hashmaliciousBrowse

                                                                                                                                    Domains

                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                    4.tcp.ngrok.ioehDnx4Ke5d.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.138.180.119
                                                                                                                                    XQehPgTn35.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.138.180.119
                                                                                                                                    FiYBg9R8m0.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.133.207.110
                                                                                                                                    BWAlL8lrQb.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.129.187.220
                                                                                                                                    0BFE93ABC8B3801B7E906960F6D69CC51088B76544EFC.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.138.180.119
                                                                                                                                    H4Q0I1RIuW.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.129.187.220
                                                                                                                                    ooAUh9ba7E.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.133.207.110
                                                                                                                                    A6FAm1ae1j.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.133.207.110
                                                                                                                                    CpOFmSHBGH.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.133.207.110
                                                                                                                                    GBtiwIB30h.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.22.15.135
                                                                                                                                    vZvmgrCXam.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.138.180.119
                                                                                                                                    63C2AB0ECE24B47CDCFE2128789214F87451A3D82D641.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.136.65.236
                                                                                                                                    D3AAB88BB737961C971ED047B4C2D5B640EFF8E678781.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.22.15.135
                                                                                                                                    DC8DDCD4DB035FA647001A01CAB6A2866D092FCAAD182.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.129.187.220
                                                                                                                                    tmkfdBpwAx.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.131.147.49
                                                                                                                                    J6wDHe2QdA.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.136.65.236
                                                                                                                                    LGKacQbjeH.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.138.180.119
                                                                                                                                    qiCot2DU55.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.136.65.236
                                                                                                                                    yEh8mVeLA6.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.136.65.236
                                                                                                                                    XFdEhEAPeE.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.136.65.236

                                                                                                                                    ASN

                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                    AMAZON-02USUOMp9cDcqZ.exeGet hashmaliciousBrowse
                                                                                                                                    • 52.58.78.16
                                                                                                                                    OrderKLB210568.exeGet hashmaliciousBrowse
                                                                                                                                    • 34.215.126.147
                                                                                                                                    q7jxy6gZMb.exeGet hashmaliciousBrowse
                                                                                                                                    • 104.192.141.1
                                                                                                                                    b9f5bca9a22f08aad48674bc42e4eaf72ab8aa3d652ba.exeGet hashmaliciousBrowse
                                                                                                                                    • 52.219.158.14
                                                                                                                                    8BDBD0yy0q.apkGet hashmaliciousBrowse
                                                                                                                                    • 52.17.153.103
                                                                                                                                    8BDBD0yy0q.apkGet hashmaliciousBrowse
                                                                                                                                    • 13.224.195.88
                                                                                                                                    ehDnx4Ke5d.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.22.15.135
                                                                                                                                    KY4cmAI0jU.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.34.12.41
                                                                                                                                    c71fd2gJus.exeGet hashmaliciousBrowse
                                                                                                                                    • 52.219.64.3
                                                                                                                                    XQehPgTn35.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.136.65.236
                                                                                                                                    E1a92ARmPw.exeGet hashmaliciousBrowse
                                                                                                                                    • 35.157.179.180
                                                                                                                                    crt9O3URua.exeGet hashmaliciousBrowse
                                                                                                                                    • 35.157.179.180
                                                                                                                                    E1a92ARmPw.exeGet hashmaliciousBrowse
                                                                                                                                    • 52.218.105.219
                                                                                                                                    DNPr7t0GMY.exeGet hashmaliciousBrowse
                                                                                                                                    • 13.59.53.244
                                                                                                                                    lTAPQJikGw.exeGet hashmaliciousBrowse
                                                                                                                                    • 99.83.154.118
                                                                                                                                    SKlGhwkzTi.exeGet hashmaliciousBrowse
                                                                                                                                    • 44.227.65.245
                                                                                                                                    SecuriteInfo.com.Trojan.Packed2.43183.29557.exeGet hashmaliciousBrowse
                                                                                                                                    • 13.59.53.244
                                                                                                                                    Letter 1019.xlsxGet hashmaliciousBrowse
                                                                                                                                    • 18.140.1.169
                                                                                                                                    #U260e#Ufe0f Zeppelin.com AudioMessage_259-55.HTMGet hashmaliciousBrowse
                                                                                                                                    • 143.204.98.37
                                                                                                                                    Proforma Invoice and Bank swift-REG.PI-0086547654.exeGet hashmaliciousBrowse
                                                                                                                                    • 75.2.26.18
                                                                                                                                    AMAZON-02USUOMp9cDcqZ.exeGet hashmaliciousBrowse
                                                                                                                                    • 52.58.78.16
                                                                                                                                    OrderKLB210568.exeGet hashmaliciousBrowse
                                                                                                                                    • 34.215.126.147
                                                                                                                                    q7jxy6gZMb.exeGet hashmaliciousBrowse
                                                                                                                                    • 104.192.141.1
                                                                                                                                    b9f5bca9a22f08aad48674bc42e4eaf72ab8aa3d652ba.exeGet hashmaliciousBrowse
                                                                                                                                    • 52.219.158.14
                                                                                                                                    8BDBD0yy0q.apkGet hashmaliciousBrowse
                                                                                                                                    • 52.17.153.103
                                                                                                                                    8BDBD0yy0q.apkGet hashmaliciousBrowse
                                                                                                                                    • 13.224.195.88
                                                                                                                                    ehDnx4Ke5d.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.22.15.135
                                                                                                                                    KY4cmAI0jU.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.34.12.41
                                                                                                                                    c71fd2gJus.exeGet hashmaliciousBrowse
                                                                                                                                    • 52.219.64.3
                                                                                                                                    XQehPgTn35.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.136.65.236
                                                                                                                                    E1a92ARmPw.exeGet hashmaliciousBrowse
                                                                                                                                    • 35.157.179.180
                                                                                                                                    crt9O3URua.exeGet hashmaliciousBrowse
                                                                                                                                    • 35.157.179.180
                                                                                                                                    E1a92ARmPw.exeGet hashmaliciousBrowse
                                                                                                                                    • 52.218.105.219
                                                                                                                                    DNPr7t0GMY.exeGet hashmaliciousBrowse
                                                                                                                                    • 13.59.53.244
                                                                                                                                    lTAPQJikGw.exeGet hashmaliciousBrowse
                                                                                                                                    • 99.83.154.118
                                                                                                                                    SKlGhwkzTi.exeGet hashmaliciousBrowse
                                                                                                                                    • 44.227.65.245
                                                                                                                                    SecuriteInfo.com.Trojan.Packed2.43183.29557.exeGet hashmaliciousBrowse
                                                                                                                                    • 13.59.53.244
                                                                                                                                    Letter 1019.xlsxGet hashmaliciousBrowse
                                                                                                                                    • 18.140.1.169
                                                                                                                                    #U260e#Ufe0f Zeppelin.com AudioMessage_259-55.HTMGet hashmaliciousBrowse
                                                                                                                                    • 143.204.98.37
                                                                                                                                    Proforma Invoice and Bank swift-REG.PI-0086547654.exeGet hashmaliciousBrowse
                                                                                                                                    • 75.2.26.18
                                                                                                                                    AMAZON-02USUOMp9cDcqZ.exeGet hashmaliciousBrowse
                                                                                                                                    • 52.58.78.16
                                                                                                                                    OrderKLB210568.exeGet hashmaliciousBrowse
                                                                                                                                    • 34.215.126.147
                                                                                                                                    q7jxy6gZMb.exeGet hashmaliciousBrowse
                                                                                                                                    • 104.192.141.1
                                                                                                                                    b9f5bca9a22f08aad48674bc42e4eaf72ab8aa3d652ba.exeGet hashmaliciousBrowse
                                                                                                                                    • 52.219.158.14
                                                                                                                                    8BDBD0yy0q.apkGet hashmaliciousBrowse
                                                                                                                                    • 52.17.153.103
                                                                                                                                    8BDBD0yy0q.apkGet hashmaliciousBrowse
                                                                                                                                    • 13.224.195.88
                                                                                                                                    ehDnx4Ke5d.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.22.15.135
                                                                                                                                    KY4cmAI0jU.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.34.12.41
                                                                                                                                    c71fd2gJus.exeGet hashmaliciousBrowse
                                                                                                                                    • 52.219.64.3
                                                                                                                                    XQehPgTn35.exeGet hashmaliciousBrowse
                                                                                                                                    • 3.136.65.236
                                                                                                                                    E1a92ARmPw.exeGet hashmaliciousBrowse
                                                                                                                                    • 35.157.179.180
                                                                                                                                    crt9O3URua.exeGet hashmaliciousBrowse
                                                                                                                                    • 35.157.179.180
                                                                                                                                    E1a92ARmPw.exeGet hashmaliciousBrowse
                                                                                                                                    • 52.218.105.219
                                                                                                                                    DNPr7t0GMY.exeGet hashmaliciousBrowse
                                                                                                                                    • 13.59.53.244
                                                                                                                                    lTAPQJikGw.exeGet hashmaliciousBrowse
                                                                                                                                    • 99.83.154.118
                                                                                                                                    SKlGhwkzTi.exeGet hashmaliciousBrowse
                                                                                                                                    • 44.227.65.245
                                                                                                                                    SecuriteInfo.com.Trojan.Packed2.43183.29557.exeGet hashmaliciousBrowse
                                                                                                                                    • 13.59.53.244
                                                                                                                                    Letter 1019.xlsxGet hashmaliciousBrowse
                                                                                                                                    • 18.140.1.169
                                                                                                                                    #U260e#Ufe0f Zeppelin.com AudioMessage_259-55.HTMGet hashmaliciousBrowse
                                                                                                                                    • 143.204.98.37
                                                                                                                                    Proforma Invoice and Bank swift-REG.PI-0086547654.exeGet hashmaliciousBrowse
                                                                                                                                    • 75.2.26.18

                                                                                                                                    JA3 Fingerprints

                                                                                                                                    No context

                                                                                                                                    Dropped Files

                                                                                                                                    No context

                                                                                                                                    Created / dropped Files

                                                                                                                                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                                    Process:C:\Users\user\Desktop\ws8W4yPAvg.exe
                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                    Category:dropped
                                                                                                                                    Size (bytes):207872
                                                                                                                                    Entropy (8bit):7.449363749668439
                                                                                                                                    Encrypted:false
                                                                                                                                    SSDEEP:6144:MLV6Bta6dtJmakIM5A6fA+eXcTTacsRy3Cj+R:MLV6BtpmkxuA+eXsaDCUq
                                                                                                                                    MD5:4F777AC67C52BE4D6A8B6F125BC94661
                                                                                                                                    SHA1:F4FE647FA467BA0D039F9CA61BC18583734F7B46
                                                                                                                                    SHA-256:D112E19D34E88C040A70367143569C965CB48DBB1FA36579838C51F8CA9EBE7C
                                                                                                                                    SHA-512:55009C93CBEAA16712DA32025E7B6ED97ED4184F8EF044C46C2F6A7B2692733DC46679BD3124CD8F5CA69884D590DD2401469BBBC0A51D82A8E5219A565409CA
                                                                                                                                    Malicious:true
                                                                                                                                    Yara Hits:
                                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
                                                                                                                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
                                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Joe Security
                                                                                                                                    • Rule: NanoCore, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                    Antivirus:
                                                                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                    Reputation:low
                                                                                                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................b........... ........@.. ......................................................................8...W.... ..._........................................................................... ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc...._... ...`..................@..@................t.......H...........T............................................................0..Q........o5.......*.o6....-.&......3+..+.... ....3......1..... 2.... ....3.... .......*.*....0..E.......s7....-(&s8....-&&s9....,$&s:........s;........*.....+.....+.....+.....0..........~....o<...*..0..........~....o=...*..0..........~....o>...*..0..........~....o?...*..0..........~....o@...*..0.............-.&(A...*&+...0..$.......~B........-.(...+.-.&+..B...+.~B...*.0.............-.&(A...*&+...0..
                                                                                                                                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                                                                                                                                    Process:C:\Users\user\Desktop\ws8W4yPAvg.exe
                                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                                    Category:dropped
                                                                                                                                    Size (bytes):26
                                                                                                                                    Entropy (8bit):3.95006375643621
                                                                                                                                    Encrypted:false
                                                                                                                                    SSDEEP:3:ggPYV:rPYV
                                                                                                                                    MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                                                    Malicious:true
                                                                                                                                    Reputation:high, very likely benign file
                                                                                                                                    Preview: [ZoneTransfer]....ZoneId=0
                                                                                                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                                                                                                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                                    Category:dropped
                                                                                                                                    Size (bytes):525
                                                                                                                                    Entropy (8bit):5.2874233355119316
                                                                                                                                    Encrypted:false
                                                                                                                                    SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                                                                                                                    MD5:61CCF53571C9ABA6511D696CB0D32E45
                                                                                                                                    SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                                                                                                                    SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                                                                                                                    SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                                                                                                                    Malicious:true
                                                                                                                                    Reputation:high, very likely benign file
                                                                                                                                    Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                                                                                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\ws8W4yPAvg.exe.log
                                                                                                                                    Process:C:\Users\user\Desktop\ws8W4yPAvg.exe
                                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                                    Category:dropped
                                                                                                                                    Size (bytes):525
                                                                                                                                    Entropy (8bit):5.2874233355119316
                                                                                                                                    Encrypted:false
                                                                                                                                    SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                                                                                                                    MD5:61CCF53571C9ABA6511D696CB0D32E45
                                                                                                                                    SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                                                                                                                    SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                                                                                                                    SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                                                                                                                    Malicious:true
                                                                                                                                    Reputation:high, very likely benign file
                                                                                                                                    Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                                                                                                                    C:\Users\user\AppData\Local\Temp\tmpEFD2.tmp
                                                                                                                                    Process:C:\Users\user\Desktop\ws8W4yPAvg.exe
                                                                                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                    Category:dropped
                                                                                                                                    Size (bytes):1300
                                                                                                                                    Entropy (8bit):5.112502432656558
                                                                                                                                    Encrypted:false
                                                                                                                                    SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0G3xtn:cbk4oL600QydbQxIYODOLedq3rj
                                                                                                                                    MD5:29AC038EA24283E9A0B7F9AA237F82BA
                                                                                                                                    SHA1:FA9A6B94A62D82114DC3D3E166752BDCD1CC8585
                                                                                                                                    SHA-256:DD957BD3A0CCA20FB6AD36B54CEBDC252241F3D770ECB3431C87717B5FE48B7A
                                                                                                                                    SHA-512:3EC9561C4805E224463AD1824F9AC231A12BC2108C79EF5900E7392B52FBDE1BD43B1E4A762FE9DBDB6F44B1F517FC6C3A2721DCFFAFF3CBD02DAF3F1A54F1A8
                                                                                                                                    Malicious:true
                                                                                                                                    Reputation:low
                                                                                                                                    Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                                                                    C:\Users\user\AppData\Local\Temp\tmpFE1B.tmp
                                                                                                                                    Process:C:\Users\user\Desktop\ws8W4yPAvg.exe
                                                                                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                    Category:modified
                                                                                                                                    Size (bytes):1310
                                                                                                                                    Entropy (8bit):5.109425792877704
                                                                                                                                    Encrypted:false
                                                                                                                                    SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                                                                                                    MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                                                                                                    SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                                                                                                    SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                                                                                                    SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                                                                                                    Malicious:false
                                                                                                                                    Reputation:moderate, very likely benign file
                                                                                                                                    Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                                                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                                                                    Process:C:\Users\user\Desktop\ws8W4yPAvg.exe
                                                                                                                                    File Type:Non-ISO extended-ASCII text, with no line terminators
                                                                                                                                    Category:dropped
                                                                                                                                    Size (bytes):8
                                                                                                                                    Entropy (8bit):3.0
                                                                                                                                    Encrypted:false
                                                                                                                                    SSDEEP:3:3JBI8tn:5BI8
                                                                                                                                    MD5:9C5F59B284ADF6282C473111B7B221FF
                                                                                                                                    SHA1:B307A21EDBB27C8C3B7CC0F2BB8020FA61D2E55A
                                                                                                                                    SHA-256:9CBE8533F0F928F1232F4A1441B49A1D687738826D3057265D174EB300B7FF3D
                                                                                                                                    SHA-512:01A70199AB09D7CAF3D37662F4193F49923C5991347D002341C1A260C2517886F2867C65DE083D57047941A5D1357017ACCFDC50948CB366688715FFFA6A2AC1
                                                                                                                                    Malicious:true
                                                                                                                                    Preview: E...M-.H
                                                                                                                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                                                                                                    Process:C:\Users\user\Desktop\ws8W4yPAvg.exe
                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                    Category:dropped
                                                                                                                                    Size (bytes):37
                                                                                                                                    Entropy (8bit):4.506750662926249
                                                                                                                                    Encrypted:false
                                                                                                                                    SSDEEP:3:oNWXp5vSWkczLACn:oNWXpFS8LACn
                                                                                                                                    MD5:2289D44B878445B8D01E11EA3DC07C63
                                                                                                                                    SHA1:B229492032E28EF9E89CAAC1B79347DFBC00AB37
                                                                                                                                    SHA-256:A8B6D4E014D16578BA30B167E59BCA31241E34A19CA6D362E6F21C08B6257FD7
                                                                                                                                    SHA-512:4C7CC362A46050F0C2B1D41A4C11F5D421E8CCAC425FA83640646960AAFFC3251DA32C8FB8C2524F39BB14CEA8BDD5A87C0E7ADFC77E97217ED8D78EC48C172B
                                                                                                                                    Malicious:false
                                                                                                                                    Preview: C:\Users\user\Desktop\ws8W4yPAvg.exe

                                                                                                                                    Static File Info

                                                                                                                                    General

                                                                                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                    Entropy (8bit):7.449363749668439
                                                                                                                                    TrID:
                                                                                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                                                    • DOS Executable Generic (2002/1) 0.01%
                                                                                                                                    File name:ws8W4yPAvg.exe
                                                                                                                                    File size:207872
                                                                                                                                    MD5:4f777ac67c52be4d6a8b6f125bc94661
                                                                                                                                    SHA1:f4fe647fa467ba0d039f9ca61bc18583734f7b46
                                                                                                                                    SHA256:d112e19d34e88c040a70367143569c965cb48dbb1fa36579838c51f8ca9ebe7c
                                                                                                                                    SHA512:55009c93cbeaa16712da32025e7b6ed97ed4184f8ef044c46c2f6a7b2692733dc46679bd3124cd8f5ca69884d590dd2401469bbbc0a51d82a8e5219a565409ca
                                                                                                                                    SSDEEP:6144:MLV6Bta6dtJmakIM5A6fA+eXcTTacsRy3Cj+R:MLV6BtpmkxuA+eXsaDCUq
                                                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................b........... ........@.. .....................................................................

                                                                                                                                    File Icon

                                                                                                                                    Icon Hash:00828e8e8686b000

                                                                                                                                    Static PE Info

                                                                                                                                    General

                                                                                                                                    Entrypoint:0x41e792
                                                                                                                                    Entrypoint Section:.text
                                                                                                                                    Digitally signed:false
                                                                                                                                    Imagebase:0x400000
                                                                                                                                    Subsystem:windows gui
                                                                                                                                    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                                                                                                    DLL Characteristics:
                                                                                                                                    Time Stamp:0x54E927A1 [Sun Feb 22 00:49:37 2015 UTC]
                                                                                                                                    TLS Callbacks:
                                                                                                                                    CLR (.Net) Version:v2.0.50727
                                                                                                                                    OS Version Major:4
                                                                                                                                    OS Version Minor:0
                                                                                                                                    File Version Major:4
                                                                                                                                    File Version Minor:0
                                                                                                                                    Subsystem Version Major:4
                                                                                                                                    Subsystem Version Minor:0
                                                                                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                                                                    Entrypoint Preview

                                                                                                                                    Instruction
                                                                                                                                    jmp dword ptr [00402000h]
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al
                                                                                                                                    add byte ptr [eax], al

                                                                                                                                    Data Directories

                                                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x1e7380x57.text
                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x15fc0.rsrc
                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x200000xc.reloc
                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                                                    Sections

                                                                                                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                    .text0x20000x1c7980x1c800False0.594503837719data6.59804227232IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                                                    .reloc0x200000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                    .rsrc0x220000x15fc00x16000False1.00012207031data7.99764484035IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                                                                                                    Resources

                                                                                                                                    NameRVASizeTypeLanguageCountry
                                                                                                                                    RT_RCDATA0x220580x15f68TIM image, (53542,20879)

                                                                                                                                    Imports

                                                                                                                                    DLLImport
                                                                                                                                    mscoree.dll_CorExeMain

                                                                                                                                    Network Behavior

                                                                                                                                    Snort IDS Alerts

                                                                                                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                                                    06/11/21-19:58:04.588686TCP2025019ET TROJAN Possible NanoCore C2 60B4972010877192.168.2.33.133.207.110
                                                                                                                                    06/11/21-19:58:09.044779TCP2025019ET TROJAN Possible NanoCore C2 60B4972410877192.168.2.33.133.207.110
                                                                                                                                    06/11/21-19:58:14.567289TCP2025019ET TROJAN Possible NanoCore C2 60B4972810877192.168.2.33.133.207.110
                                                                                                                                    06/11/21-19:58:34.714536TCP2025019ET TROJAN Possible NanoCore C2 60B4973810877192.168.2.33.133.207.110
                                                                                                                                    06/11/21-19:58:39.400073TCP2025019ET TROJAN Possible NanoCore C2 60B4973910877192.168.2.33.133.207.110
                                                                                                                                    06/11/21-19:58:44.481466TCP2025019ET TROJAN Possible NanoCore C2 60B4974010877192.168.2.33.133.207.110
                                                                                                                                    06/11/21-19:59:04.476577TCP2025019ET TROJAN Possible NanoCore C2 60B4975010877192.168.2.33.22.15.135
                                                                                                                                    06/11/21-19:59:08.898642TCP2025019ET TROJAN Possible NanoCore C2 60B4975610877192.168.2.33.133.207.110
                                                                                                                                    06/11/21-19:59:14.004266TCP2025019ET TROJAN Possible NanoCore C2 60B4975710877192.168.2.33.22.15.135
                                                                                                                                    06/11/21-19:59:34.725309TCP2025019ET TROJAN Possible NanoCore C2 60B4976110877192.168.2.33.131.147.49
                                                                                                                                    06/11/21-19:59:39.481808TCP2025019ET TROJAN Possible NanoCore C2 60B4976410877192.168.2.33.22.15.135
                                                                                                                                    06/11/21-19:59:44.243284TCP2025019ET TROJAN Possible NanoCore C2 60B4976510877192.168.2.33.131.147.49
                                                                                                                                    06/11/21-20:00:03.840152TCP2025019ET TROJAN Possible NanoCore C2 60B4976910877192.168.2.33.138.180.119
                                                                                                                                    06/11/21-20:00:08.194247TCP2025019ET TROJAN Possible NanoCore C2 60B4977010877192.168.2.33.138.180.119

                                                                                                                                    Network Port Distribution

                                                                                                                                    TCP Packets

                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                    Jun 11, 2021 19:58:04.403009892 CEST4972010877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:04.545111895 CEST10877497203.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:04.545603037 CEST4972010877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:04.588685989 CEST4972010877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:04.685373068 CEST10877497203.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:04.685549974 CEST4972010877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:04.686511993 CEST4972010877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:04.827195883 CEST10877497203.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:08.902681112 CEST4972410877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:09.043320894 CEST10877497243.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:09.044454098 CEST4972410877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:09.044779062 CEST4972410877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:09.183835030 CEST10877497243.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:09.183923960 CEST10877497243.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:09.183989048 CEST4972410877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:09.184094906 CEST4972410877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:09.323215008 CEST10877497243.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:14.426196098 CEST4972810877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:14.566521883 CEST10877497283.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:14.566668987 CEST4972810877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:14.567289114 CEST4972810877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:14.705598116 CEST10877497283.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:14.705689907 CEST4972810877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:14.711880922 CEST4972810877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:14.846218109 CEST10877497283.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:34.573154926 CEST4973810877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:34.713946104 CEST10877497383.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:34.714077950 CEST4973810877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:34.714535952 CEST4973810877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:34.855199099 CEST10877497383.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:34.855495930 CEST10877497383.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:34.858256102 CEST4973810877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:34.858376026 CEST4973810877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:34.997383118 CEST10877497383.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:39.260561943 CEST4973910877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:39.399466038 CEST10877497393.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:39.399610996 CEST4973910877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:39.400073051 CEST4973910877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:39.538490057 CEST10877497393.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:39.538610935 CEST4973910877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:39.538718939 CEST4973910877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:39.680330038 CEST10877497393.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:44.340651035 CEST4974010877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:44.480854034 CEST10877497403.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:44.481008053 CEST4974010877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:44.481466055 CEST4974010877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:44.620685101 CEST10877497403.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:44.620735884 CEST10877497403.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:44.620831966 CEST4974010877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:44.620964050 CEST4974010877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:58:44.763111115 CEST10877497403.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:03.995105028 CEST4975010877192.168.2.33.22.15.135
                                                                                                                                    Jun 11, 2021 19:59:04.134140968 CEST10877497503.22.15.135192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:04.134345055 CEST4975010877192.168.2.33.22.15.135
                                                                                                                                    Jun 11, 2021 19:59:04.273701906 CEST10877497503.22.15.135192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:04.273895025 CEST4975010877192.168.2.33.22.15.135
                                                                                                                                    Jun 11, 2021 19:59:04.476577044 CEST4975010877192.168.2.33.22.15.135
                                                                                                                                    Jun 11, 2021 19:59:04.476900101 CEST4975010877192.168.2.33.22.15.135
                                                                                                                                    Jun 11, 2021 19:59:04.615555048 CEST10877497503.22.15.135192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:08.757270098 CEST4975610877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:59:08.898076057 CEST10877497563.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:08.898200035 CEST4975610877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:59:08.898642063 CEST4975610877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:59:09.037270069 CEST10877497563.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:09.037298918 CEST10877497563.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:09.037435055 CEST4975610877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:59:09.037508965 CEST4975610877192.168.2.33.133.207.110
                                                                                                                                    Jun 11, 2021 19:59:09.176383972 CEST10877497563.133.207.110192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:13.806499004 CEST4975710877192.168.2.33.22.15.135
                                                                                                                                    Jun 11, 2021 19:59:13.946713924 CEST10877497573.22.15.135192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:13.946926117 CEST4975710877192.168.2.33.22.15.135
                                                                                                                                    Jun 11, 2021 19:59:14.004266024 CEST4975710877192.168.2.33.22.15.135
                                                                                                                                    Jun 11, 2021 19:59:14.085984945 CEST10877497573.22.15.135192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:14.086097956 CEST4975710877192.168.2.33.22.15.135
                                                                                                                                    Jun 11, 2021 19:59:14.086210966 CEST4975710877192.168.2.33.22.15.135
                                                                                                                                    Jun 11, 2021 19:59:14.225075960 CEST10877497573.22.15.135192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:34.582214117 CEST4976110877192.168.2.33.131.147.49
                                                                                                                                    Jun 11, 2021 19:59:34.723385096 CEST10877497613.131.147.49192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:34.724436998 CEST4976110877192.168.2.33.131.147.49
                                                                                                                                    Jun 11, 2021 19:59:34.725308895 CEST4976110877192.168.2.33.131.147.49
                                                                                                                                    Jun 11, 2021 19:59:34.864056110 CEST10877497613.131.147.49192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:34.864510059 CEST10877497613.131.147.49192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:34.864751101 CEST4976110877192.168.2.33.131.147.49
                                                                                                                                    Jun 11, 2021 19:59:34.864793062 CEST4976110877192.168.2.33.131.147.49
                                                                                                                                    Jun 11, 2021 19:59:35.005775928 CEST10877497613.131.147.49192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:39.338007927 CEST4976410877192.168.2.33.22.15.135
                                                                                                                                    Jun 11, 2021 19:59:39.477766991 CEST10877497643.22.15.135192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:39.481096983 CEST4976410877192.168.2.33.22.15.135
                                                                                                                                    Jun 11, 2021 19:59:39.481807947 CEST4976410877192.168.2.33.22.15.135
                                                                                                                                    Jun 11, 2021 19:59:39.620954990 CEST10877497643.22.15.135192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:39.621108055 CEST4976410877192.168.2.33.22.15.135
                                                                                                                                    Jun 11, 2021 19:59:39.624483109 CEST4976410877192.168.2.33.22.15.135
                                                                                                                                    Jun 11, 2021 19:59:39.760782003 CEST10877497643.22.15.135192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:44.102575064 CEST4976510877192.168.2.33.131.147.49
                                                                                                                                    Jun 11, 2021 19:59:44.241961956 CEST10877497653.131.147.49192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:44.242136955 CEST4976510877192.168.2.33.131.147.49
                                                                                                                                    Jun 11, 2021 19:59:44.243283987 CEST4976510877192.168.2.33.131.147.49
                                                                                                                                    Jun 11, 2021 19:59:44.384069920 CEST10877497653.131.147.49192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:44.384316921 CEST4976510877192.168.2.33.131.147.49
                                                                                                                                    Jun 11, 2021 19:59:44.384653091 CEST4976510877192.168.2.33.131.147.49

                                                                                                                                    UDP Packets

                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                    Jun 11, 2021 19:57:50.179717064 CEST6418553192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:57:50.229897976 CEST53641858.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:57:51.300148964 CEST6511053192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:57:51.353375912 CEST53651108.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:57:52.745112896 CEST5836153192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:57:52.795526028 CEST53583618.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:57:53.993895054 CEST6349253192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:57:54.047333956 CEST53634928.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:57:55.007006884 CEST6083153192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:57:55.060143948 CEST53608318.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:57:56.102796078 CEST6010053192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:57:56.155767918 CEST53601008.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:57:56.974694967 CEST5319553192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:57:57.024892092 CEST53531958.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:57:59.264272928 CEST5014153192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:57:59.314898014 CEST53501418.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:00.971560001 CEST5302353192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:01.023175955 CEST53530238.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:02.225924969 CEST4956353192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:02.276540041 CEST53495638.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:03.199132919 CEST5135253192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:03.257730961 CEST53513528.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:04.158620119 CEST5934953192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:04.217259884 CEST53593498.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:04.269948006 CEST5708453192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:04.333017111 CEST53570848.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:05.046550989 CEST5882353192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:05.105165005 CEST53588238.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:05.966762066 CEST5756853192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:06.018678904 CEST53575688.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:08.141032934 CEST5054053192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:08.194413900 CEST53505408.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:08.838542938 CEST5436653192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:08.899372101 CEST53543668.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:09.029974937 CEST5303453192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:09.082875967 CEST53530348.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:10.126291990 CEST5776253192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:10.177953005 CEST53577628.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:11.453758955 CEST5543553192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:11.503988981 CEST53554358.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:14.362339973 CEST5071353192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:14.423520088 CEST53507138.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:23.629620075 CEST5613253192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:23.688745975 CEST53561328.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:27.656894922 CEST5898753192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:27.720432043 CEST53589878.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:34.513066053 CEST5657953192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:34.571826935 CEST53565798.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:39.199907064 CEST6063353192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:39.258991003 CEST53606338.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:44.280694962 CEST6129253192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:44.339658976 CEST53612928.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:45.158186913 CEST6361953192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:45.230710983 CEST53636198.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:47.032584906 CEST6493853192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:47.092215061 CEST53649388.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:58:47.190593958 CEST6194653192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:58:47.250890017 CEST53619468.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:00.615561008 CEST6491053192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:59:00.688441038 CEST53649108.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:03.929529905 CEST5212353192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:59:03.993848085 CEST53521238.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:07.549428940 CEST5613053192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:59:07.610183001 CEST53561308.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:08.695753098 CEST5633853192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:59:08.755603075 CEST53563388.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:13.745275021 CEST5942053192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:59:13.804868937 CEST53594208.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:34.521006107 CEST5878453192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:59:34.579324961 CEST53587848.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:35.705945015 CEST6397853192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:59:35.774312973 CEST53639788.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:36.869941950 CEST6293853192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:59:36.937087059 CEST53629388.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:39.277440071 CEST5570853192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:59:39.336503029 CEST53557088.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 19:59:44.040237904 CEST5680353192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 19:59:44.100423098 CEST53568038.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 20:00:03.633408070 CEST5714553192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 20:00:03.696804047 CEST53571458.8.8.8192.168.2.3
                                                                                                                                    Jun 11, 2021 20:00:07.992259026 CEST5535953192.168.2.38.8.8.8
                                                                                                                                    Jun 11, 2021 20:00:08.053497076 CEST53553598.8.8.8192.168.2.3

                                                                                                                                    DNS Queries

                                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                                                    Jun 11, 2021 19:58:04.269948006 CEST192.168.2.38.8.8.80x63cfStandard query (0)4.tcp.ngrok.ioA (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:58:08.838542938 CEST192.168.2.38.8.8.80x7f34Standard query (0)4.tcp.ngrok.ioA (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:58:14.362339973 CEST192.168.2.38.8.8.80xcbc1Standard query (0)4.tcp.ngrok.ioA (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:58:34.513066053 CEST192.168.2.38.8.8.80xeeb3Standard query (0)4.tcp.ngrok.ioA (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:58:39.199907064 CEST192.168.2.38.8.8.80xc08fStandard query (0)4.tcp.ngrok.ioA (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:58:44.280694962 CEST192.168.2.38.8.8.80xc847Standard query (0)4.tcp.ngrok.ioA (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:59:03.929529905 CEST192.168.2.38.8.8.80x4f2aStandard query (0)4.tcp.ngrok.ioA (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:59:08.695753098 CEST192.168.2.38.8.8.80xdc18Standard query (0)4.tcp.ngrok.ioA (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:59:13.745275021 CEST192.168.2.38.8.8.80x61cbStandard query (0)4.tcp.ngrok.ioA (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:59:34.521006107 CEST192.168.2.38.8.8.80x3addStandard query (0)4.tcp.ngrok.ioA (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:59:39.277440071 CEST192.168.2.38.8.8.80x1a22Standard query (0)4.tcp.ngrok.ioA (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:59:44.040237904 CEST192.168.2.38.8.8.80x2764Standard query (0)4.tcp.ngrok.ioA (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 20:00:03.633408070 CEST192.168.2.38.8.8.80xfc99Standard query (0)4.tcp.ngrok.ioA (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 20:00:07.992259026 CEST192.168.2.38.8.8.80xac89Standard query (0)4.tcp.ngrok.ioA (IP address)IN (0x0001)

                                                                                                                                    DNS Answers

                                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                                                    Jun 11, 2021 19:58:04.333017111 CEST8.8.8.8192.168.2.30x63cfNo error (0)4.tcp.ngrok.io3.133.207.110A (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:58:08.899372101 CEST8.8.8.8192.168.2.30x7f34No error (0)4.tcp.ngrok.io3.133.207.110A (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:58:14.423520088 CEST8.8.8.8192.168.2.30xcbc1No error (0)4.tcp.ngrok.io3.133.207.110A (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:58:34.571826935 CEST8.8.8.8192.168.2.30xeeb3No error (0)4.tcp.ngrok.io3.133.207.110A (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:58:39.258991003 CEST8.8.8.8192.168.2.30xc08fNo error (0)4.tcp.ngrok.io3.133.207.110A (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:58:44.339658976 CEST8.8.8.8192.168.2.30xc847No error (0)4.tcp.ngrok.io3.133.207.110A (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:59:03.993848085 CEST8.8.8.8192.168.2.30x4f2aNo error (0)4.tcp.ngrok.io3.22.15.135A (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:59:08.755603075 CEST8.8.8.8192.168.2.30xdc18No error (0)4.tcp.ngrok.io3.133.207.110A (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:59:13.804868937 CEST8.8.8.8192.168.2.30x61cbNo error (0)4.tcp.ngrok.io3.22.15.135A (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:59:34.579324961 CEST8.8.8.8192.168.2.30x3addNo error (0)4.tcp.ngrok.io3.131.147.49A (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:59:39.336503029 CEST8.8.8.8192.168.2.30x1a22No error (0)4.tcp.ngrok.io3.22.15.135A (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 19:59:44.100423098 CEST8.8.8.8192.168.2.30x2764No error (0)4.tcp.ngrok.io3.131.147.49A (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 20:00:03.696804047 CEST8.8.8.8192.168.2.30xfc99No error (0)4.tcp.ngrok.io3.138.180.119A (IP address)IN (0x0001)
                                                                                                                                    Jun 11, 2021 20:00:08.053497076 CEST8.8.8.8192.168.2.30xac89No error (0)4.tcp.ngrok.io3.138.180.119A (IP address)IN (0x0001)

                                                                                                                                    Code Manipulations

                                                                                                                                    Statistics

                                                                                                                                    Behavior

                                                                                                                                    Click to jump to process

                                                                                                                                    System Behavior

                                                                                                                                    General

                                                                                                                                    Start time:19:57:56
                                                                                                                                    Start date:11/06/2021
                                                                                                                                    Path:C:\Users\user\Desktop\ws8W4yPAvg.exe
                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                    Commandline:'C:\Users\user\Desktop\ws8W4yPAvg.exe'
                                                                                                                                    Imagebase:0x60000
                                                                                                                                    File size:207872 bytes
                                                                                                                                    MD5 hash:4F777AC67C52BE4D6A8B6F125BC94661
                                                                                                                                    Has elevated privileges:true
                                                                                                                                    Has administrator privileges:true
                                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                                    Yara matches:
                                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.464501359.0000000000062000.00000002.00020000.sdmp, Author: Florian Roth
                                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.464501359.0000000000062000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.464501359.0000000000062000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000000.198429567.0000000000062000.00000002.00020000.sdmp, Author: Florian Roth
                                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000000.198429567.0000000000062000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000000.198429567.0000000000062000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                    Reputation:low

                                                                                                                                    General

                                                                                                                                    Start time:19:57:58
                                                                                                                                    Start date:11/06/2021
                                                                                                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                    Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpEFD2.tmp'
                                                                                                                                    Imagebase:0x8d0000
                                                                                                                                    File size:185856 bytes
                                                                                                                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                                                    Has elevated privileges:true
                                                                                                                                    Has administrator privileges:true
                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                    Reputation:high

                                                                                                                                    General

                                                                                                                                    Start time:19:58:00
                                                                                                                                    Start date:11/06/2021
                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                    Imagebase:0x7ff6b2800000
                                                                                                                                    File size:625664 bytes
                                                                                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                                    Has elevated privileges:true
                                                                                                                                    Has administrator privileges:true
                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                    Reputation:high

                                                                                                                                    General

                                                                                                                                    Start time:19:58:01
                                                                                                                                    Start date:11/06/2021
                                                                                                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                    Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpFE1B.tmp'
                                                                                                                                    Imagebase:0x8d0000
                                                                                                                                    File size:185856 bytes
                                                                                                                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                                                    Has elevated privileges:true
                                                                                                                                    Has administrator privileges:true
                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                    Reputation:high

                                                                                                                                    General

                                                                                                                                    Start time:19:58:01
                                                                                                                                    Start date:11/06/2021
                                                                                                                                    Path:C:\Users\user\Desktop\ws8W4yPAvg.exe
                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                    Commandline:C:\Users\user\Desktop\ws8W4yPAvg.exe 0
                                                                                                                                    Imagebase:0x50000
                                                                                                                                    File size:207872 bytes
                                                                                                                                    MD5 hash:4F777AC67C52BE4D6A8B6F125BC94661
                                                                                                                                    Has elevated privileges:true
                                                                                                                                    Has administrator privileges:true
                                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                                    Yara matches:
                                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.223088157.0000000000052000.00000002.00020000.sdmp, Author: Florian Roth
                                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.223088157.0000000000052000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.223088157.0000000000052000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.224117894.00000000038B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.224117894.00000000038B1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.224074695.00000000028B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.224074695.00000000028B1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000000.209534119.0000000000052000.00000002.00020000.sdmp, Author: Florian Roth
                                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000000.209534119.0000000000052000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000005.00000000.209534119.0000000000052000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                    Reputation:low

                                                                                                                                    General

                                                                                                                                    Start time:19:58:02
                                                                                                                                    Start date:11/06/2021
                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                    Imagebase:0x7ff6b2800000
                                                                                                                                    File size:625664 bytes
                                                                                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                                    Has elevated privileges:true
                                                                                                                                    Has administrator privileges:true
                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                    Reputation:high

                                                                                                                                    General

                                                                                                                                    Start time:19:58:03
                                                                                                                                    Start date:11/06/2021
                                                                                                                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                    Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                                                                                                    Imagebase:0x390000
                                                                                                                                    File size:207872 bytes
                                                                                                                                    MD5 hash:4F777AC67C52BE4D6A8B6F125BC94661
                                                                                                                                    Has elevated privileges:true
                                                                                                                                    Has administrator privileges:true
                                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                                    Yara matches:
                                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.214551753.0000000000392000.00000002.00020000.sdmp, Author: Florian Roth
                                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.214551753.0000000000392000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.214551753.0000000000392000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.229264984.00000000029E1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.229264984.00000000029E1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.229298937.00000000039E1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.229298937.00000000039E1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.228024538.0000000000392000.00000002.00020000.sdmp, Author: Florian Roth
                                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.228024538.0000000000392000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.228024538.0000000000392000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
                                                                                                                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
                                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Joe Security
                                                                                                                                    • Rule: NanoCore, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                    Antivirus matches:
                                                                                                                                    • Detection: 100%, Avira
                                                                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                                                                    Reputation:low

                                                                                                                                    General

                                                                                                                                    Start time:19:58:07
                                                                                                                                    Start date:11/06/2021
                                                                                                                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                    Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                                                                                    Imagebase:0xc0000
                                                                                                                                    File size:207872 bytes
                                                                                                                                    MD5 hash:4F777AC67C52BE4D6A8B6F125BC94661
                                                                                                                                    Has elevated privileges:true
                                                                                                                                    Has administrator privileges:true
                                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                                    Yara matches:
                                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.239146095.00000000036A1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.239146095.00000000036A1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.238181318.00000000000C2000.00000002.00020000.sdmp, Author: Florian Roth
                                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.238181318.00000000000C2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.238181318.00000000000C2000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.222145161.00000000000C2000.00000002.00020000.sdmp, Author: Florian Roth
                                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.222145161.00000000000C2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.222145161.00000000000C2000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.239109730.00000000026A1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.239109730.00000000026A1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                    Reputation:low

                                                                                                                                    Disassembly

                                                                                                                                    Code Analysis

                                                                                                                                    Reset < >