Loading ...

Play interactive tourEdit tour

Windows Analysis Report kw7HGENm1D.exe

Overview

General Information

Sample Name:kw7HGENm1D.exe
Analysis ID:451838
MD5:a854bd1a3ff6d359a5e2e76154892444
SHA1:b8de8cb81adbb8cc5456a2100ffd3502548b0c2c
SHA256:8fb35304f24a6348adbd96f2ece69cdc23aa2442cfe28ca910ee31b48fd43632
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Uses dynamic DNS services
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • kw7HGENm1D.exe (PID: 1700 cmdline: 'C:\Users\user\Desktop\kw7HGENm1D.exe' MD5: A854BD1A3FF6D359A5E2E76154892444)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "39997603-c9cb-4099-abed-49c0195a", "Group": "Old", "Domain1": "newhost.publicvm.com", "Domain2": "backupnewhost.duckdns.org", "Port": 9911, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
kw7HGENm1D.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xcafd:$x1: NanoCore.ClientPluginHost
  • 0xcb34:$x1: NanoCore.ClientPluginHost
  • 0xdddf:$x1: NanoCore.ClientPluginHost
  • 0xde13:$x1: NanoCore.ClientPluginHost
  • 0xdef6:$x1: NanoCore.ClientPluginHost
  • 0xdf30:$x1: NanoCore.ClientPluginHost
  • 0xdf6e:$x1: NanoCore.ClientPluginHost
  • 0xdfa7:$x1: NanoCore.ClientPluginHost
  • 0xe335:$x1: NanoCore.ClientPluginHost
  • 0xcb17:$x2: IClientNetworkHost
  • 0xcb4e:$x2: IClientNetworkHost
  • 0xe322:$x2: IClientNetworkHost
kw7HGENm1D.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xd349:$x1: NanoCore Client.exe
  • 0xcafd:$x2: NanoCore.ClientPluginHost
  • 0xcb34:$x2: NanoCore.ClientPluginHost
  • 0xdddf:$x2: NanoCore.ClientPluginHost
  • 0xde13:$x2: NanoCore.ClientPluginHost
  • 0xdef6:$x2: NanoCore.ClientPluginHost
  • 0xdf30:$x2: NanoCore.ClientPluginHost
  • 0xdf6e:$x2: NanoCore.ClientPluginHost
  • 0xdfa7:$x2: NanoCore.ClientPluginHost
  • 0xe335:$x2: NanoCore.ClientPluginHost
  • 0xcb9d:$s1: PluginCommand
  • 0xcb85:$s2: FileCommand
  • 0xe187:$s3: PipeExists
  • 0xcaf1:$s4: PipeCreated
  • 0xe30f:$s5: IClientLoggingHost
kw7HGENm1D.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    kw7HGENm1D.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xcafd:$a: NanoCore
    • 0xcb34:$a: NanoCore
    • 0xcf6f:$a: NanoCore
    • 0xd349:$a: NanoCore
    • 0xd785:$a: NanoCore
    • 0xdddf:$a: NanoCore
    • 0xde13:$a: NanoCore
    • 0xdef6:$a: NanoCore
    • 0xdf30:$a: NanoCore
    • 0xdf6e:$a: NanoCore
    • 0xdfa7:$a: NanoCore
    • 0xe22c:$a: NanoCore
    • 0xe335:$a: NanoCore
    • 0xcb06:$b: ClientPlugin
    • 0xcb3d:$b: ClientPlugin
    • 0xd78e:$b: ClientPlugin
    • 0xdde8:$b: ClientPlugin
    • 0xde1c:$b: ClientPlugin
    • 0xdeff:$b: ClientPlugin
    • 0xdf39:$b: ClientPlugin
    • 0xdf77:$b: ClientPlugin

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000000.00000002.514043603.0000000005EE0000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1f1db:$x1: NanoCore.ClientPluginHost
    • 0x1f1f5:$x2: IClientNetworkHost
    00000000.00000002.514043603.0000000005EE0000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x1f1db:$x2: NanoCore.ClientPluginHost
    • 0x22518:$s4: PipeCreated
    • 0x1f1c8:$s5: IClientLoggingHost
    00000000.00000002.514025811.0000000005ED0000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x350b:$x1: NanoCore.ClientPluginHost
    • 0x3525:$x2: IClientNetworkHost
    00000000.00000002.514025811.0000000005ED0000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x350b:$x2: NanoCore.ClientPluginHost
    • 0x52b6:$s4: PipeCreated
    • 0x34f8:$s5: IClientLoggingHost
    00000000.00000002.511088441.00000000039C0000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x5d90a:$a: NanoCore
    • 0x5d933:$a: NanoCore
    • 0x827f6:$a: NanoCore
    • 0x8280e:$a: NanoCore
    • 0x82837:$a: NanoCore
    • 0x92dc1:$a: NanoCore
    • 0x9374c:$a: NanoCore
    • 0x5d913:$b: ClientPlugin
    • 0x5d93c:$b: ClientPlugin
    • 0x82525:$b: ClientPlugin
    • 0x8253e:$b: ClientPlugin
    • 0x8256e:$b: ClientPlugin
    • 0x82817:$b: ClientPlugin
    • 0x82840:$b: ClientPlugin
    • 0x92dca:$b: ClientPlugin
    • 0x93755:$b: ClientPlugin
    • 0x95b0a:$b: ClientPlugin
    • 0x5d844:$c: ProjectData
    • 0x8270d:$c: ProjectData
    • 0x7dbf5:$e: KeepAlive
    • 0x924b7:$g: LogClientMessage
    Click to see the 26 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    0.2.kw7HGENm1D.exe.4bf0000.16.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xf7ad:$x1: NanoCore.ClientPluginHost
    • 0xf7da:$x2: IClientNetworkHost
    0.2.kw7HGENm1D.exe.4bf0000.16.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xf7ad:$x2: NanoCore.ClientPluginHost
    • 0x10888:$s4: PipeCreated
    • 0xf7c7:$s5: IClientLoggingHost
    0.2.kw7HGENm1D.exe.4bf0000.16.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0.2.kw7HGENm1D.exe.4bc0000.14.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      0.2.kw7HGENm1D.exe.4bc0000.14.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      Click to see the 94 entries

      Sigma Overview

      AV Detection:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\kw7HGENm1D.exe, ProcessId: 1700, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\kw7HGENm1D.exe, ProcessId: 1700, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Stealing of Sensitive Information:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\kw7HGENm1D.exe, ProcessId: 1700, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\kw7HGENm1D.exe, ProcessId: 1700, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Antivirus / Scanner detection for submitted sampleShow sources
      Source: kw7HGENm1D.exeAvira: detected
      Found malware configurationShow sources
      Source: 00000000.00000002.510127578.0000000003689000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "39997603-c9cb-4099-abed-49c0195a", "Group": "Old", "Domain1": "newhost.publicvm.com", "Domain2": "backupnewhost.duckdns.org", "Port": 9911, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Multi AV Scanner detection for submitted fileShow sources
      Source: kw7HGENm1D.exeVirustotal: Detection: 63%Perma Link
      Source: kw7HGENm1D.exeMetadefender: Detection: 57%Perma Link
      Source: kw7HGENm1D.exeReversingLabs: Detection: 88%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: kw7HGENm1D.exe, type: SAMPLE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.4bf0000.16.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.4bf0000.16.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.4bf4629.15.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.3696f20.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.3696f20.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.369b549.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.0.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000000.236906939.0000000000082000.00000002.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.510127578.0000000003689000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.512499976.0000000004BF0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.504244186.0000000000082000.00000002.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: kw7HGENm1D.exe PID: 1700, type: MEMORY
      Machine Learning detection for sampleShow sources
      Source: kw7HGENm1D.exeJoe Sandbox ML: detected
      Source: 0.2.kw7HGENm1D.exe.4bf0000.16.unpackAvira: Label: TR/NanoCore.fadte
      Source: kw7HGENm1D.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: Binary string: C:\Users\Enc\Desktop\AllPassWords\MultiCore-master\MyClientPlugin\obj\Debug\Client.pdb source: kw7HGENm1D.exe, 00000000.00000003.354611004.0000000003ACC000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Enc\Desktop\MultiCore-master\MultiCore-master\MyClientPlugin\obj\Debug\Client.pdb source: kw7HGENm1D.exe, 00000000.00000002.511088441.00000000039C0000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Enc\Desktop\MultiCore-master\MultiCore-master\MyClientPlugin\obj\Debug\Client.pdb| source: kw7HGENm1D.exe, 00000000.00000002.511088441.00000000039C0000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Enc\Desktop\AllPassWords\MultiCore-master\MyClientPlugin\obj\Debug\Client.pdbD source: kw7HGENm1D.exe, 00000000.00000003.354611004.0000000003ACC000.00000004.00000001.sdmp
      Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: kw7HGENm1D.exe, 00000000.00000003.354611004.0000000003ACC000.00000004.00000001.sdmp
      Source: Binary string: mscorrc.pdb source: kw7HGENm1D.exe, 00000000.00000002.512219662.0000000004B10000.00000002.00000001.sdmp

      Networking:

      barindex
      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49721 -> 3.92.185.198:9911
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49722 -> 3.92.185.198:9911
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49725 -> 3.92.185.198:9911
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49731 -> 3.92.185.198:9911
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49732 -> 3.92.185.198:9911
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49733 -> 3.92.185.198:9911
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49734 -> 3.92.185.198:9911
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49735 -> 3.92.185.198:9911
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49739 -> 3.92.185.198:9911
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49740 -> 3.92.185.198:9911
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49741 -> 3.92.185.198:9911
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49742 -> 3.92.185.198:9911
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: backupnewhost.duckdns.org
      Source: Malware configuration extractorURLs: newhost.publicvm.com
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: backupnewhost.duckdns.org
      Source: global trafficTCP traffic: 192.168.2.5:49700 -> 52.91.94.222:9911
      Source: global trafficTCP traffic: 192.168.2.5:49721 -> 3.92.185.198:9911
      Source: Joe Sandbox ViewASN Name: AMAZON-AESUS AMAZON-AESUS
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_04992A0E WSARecv,
      Source: unknownDNS traffic detected: queries for: newhost.publicvm.com
      Source: kw7HGENm1D.exe, 00000000.00000002.510475412.0000000003765000.00000004.00000001.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
      Source: kw7HGENm1D.exe, 00000000.00000002.510475412.0000000003765000.00000004.00000001.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
      Source: kw7HGENm1D.exe, 00000000.00000002.510475412.0000000003765000.00000004.00000001.sdmp, kw7HGENm1D.exe, 00000000.00000003.436320393.0000000003AF2000.00000004.00000001.sdmp, kw7HGENm1D.exe, 00000000.00000002.508807205.00000000027AD000.00000004.00000001.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
      Source: kw7HGENm1D.exe, 00000000.00000003.436320393.0000000003AF2000.00000004.00000001.sdmp, kw7HGENm1D.exe, 00000000.00000002.508807205.00000000027AD000.00000004.00000001.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
      Source: kw7HGENm1D.exe, 00000000.00000002.510475412.0000000003765000.00000004.00000001.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabp
      Source: kw7HGENm1D.exe, 00000000.00000002.510475412.0000000003765000.00000004.00000001.sdmp, kw7HGENm1D.exe, 00000000.00000003.436320393.0000000003AF2000.00000004.00000001.sdmp, kw7HGENm1D.exe, 00000000.00000002.508807205.00000000027AD000.00000004.00000001.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
      Source: kw7HGENm1D.exe, 00000000.00000003.436320393.0000000003AF2000.00000004.00000001.sdmpString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
      Source: kw7HGENm1D.exe, 00000000.00000002.510475412.0000000003765000.00000004.00000001.sdmpString found in binary or memory: https://search.yahoo.com/search
      Source: kw7HGENm1D.exe, 00000000.00000002.510475412.0000000003765000.00000004.00000001.sdmp, kw7HGENm1D.exe, 00000000.00000003.436320393.0000000003AF2000.00000004.00000001.sdmpString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
      Source: kw7HGENm1D.exe, 00000000.00000002.510475412.0000000003765000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
      Source: kw7HGENm1D.exe, 00000000.00000002.510127578.0000000003689000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: kw7HGENm1D.exe, type: SAMPLE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.4bf0000.16.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.4bf0000.16.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.4bf4629.15.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.3696f20.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.3696f20.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.369b549.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.0.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000000.236906939.0000000000082000.00000002.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.510127578.0000000003689000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.512499976.0000000004BF0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.504244186.0000000000082000.00000002.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: kw7HGENm1D.exe PID: 1700, type: MEMORY

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: kw7HGENm1D.exe, type: SAMPLEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: kw7HGENm1D.exe, type: SAMPLEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.kw7HGENm1D.exe.4bf0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.4bc0000.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.5f20000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.5f20000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.4bf0000.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.4bf4629.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.26ba7a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.3696f20.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.393e9b7.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.3696f20.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.5e60000.21.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.5e50000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.5ee0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.369b549.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.5eee8a4.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.5e60000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.3.kw7HGENm1D.exe.3af1829.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.5e50000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.3.kw7HGENm1D.exe.3af1829.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.kw7HGENm1D.exe.26b2d6c.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.5e90000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.5e40000.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.3a31f00.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.3a31f00.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.kw7HGENm1D.exe.3a282fb.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.3a282fb.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.kw7HGENm1D.exe.5ed0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.26ba7a0.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.5ec0000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.5ed0000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.3.kw7HGENm1D.exe.3add1fe.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.3.kw7HGENm1D.exe.3add1fe.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.kw7HGENm1D.exe.5ec0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.39485bc.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.5ee4c9f.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.3.kw7HGENm1D.exe.3ad0fcc.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.3.kw7HGENm1D.exe.3ad0fcc.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.kw7HGENm1D.exe.26b2d6c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.3939d18.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.5e40000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.0.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.0.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.kw7HGENm1D.exe.3a2365c.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.3a2365c.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.kw7HGENm1D.exe.5ee0000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.3a2365c.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.kw7HGENm1D.exe.2641394.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.kw7HGENm1D.exe.3939d18.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.514043603.0000000005EE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.514025811.0000000005ED0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.511088441.00000000039C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.514088521.0000000005F20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000000.236906939.0000000000082000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.512440128.0000000004BC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000003.354611004.0000000003ACC000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.513862961.0000000005E40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.512499976.0000000004BF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.513888087.0000000005E50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.504244186.0000000000082000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.513910421.0000000005E60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.508012570.0000000002631000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.513957780.0000000005E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.514007279.0000000005EC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: kw7HGENm1D.exe PID: 1700, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_0499116A NtQuerySystemInformation,
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_0499112F NtQuerySystemInformation,
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_008A78D6
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_0486F500
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_04866268
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_04868B28
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_04866E68
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_04866F2F
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_05E81BA8
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_05E827A8
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_05E87590
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_05E802C0
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_05E8A280
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_05E85C68
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_05E86250
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_05E84430
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_05E80387
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_05E82348
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_05E85D2F
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_05E82338
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_05E89EF8
      Source: kw7HGENm1D.exe, 00000000.00000002.511060217.00000000039B4000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs kw7HGENm1D.exe
      Source: kw7HGENm1D.exe, 00000000.00000002.512014259.0000000004970000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs kw7HGENm1D.exe
      Source: kw7HGENm1D.exe, 00000000.00000002.513025967.0000000005470000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs kw7HGENm1D.exe
      Source: kw7HGENm1D.exe, 00000000.00000002.514043603.0000000005EE0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs kw7HGENm1D.exe
      Source: kw7HGENm1D.exe, 00000000.00000002.514043603.0000000005EE0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs kw7HGENm1D.exe
      Source: kw7HGENm1D.exe, 00000000.00000002.514043603.0000000005EE0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs kw7HGENm1D.exe
      Source: kw7HGENm1D.exe, 00000000.00000002.511088441.00000000039C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs kw7HGENm1D.exe
      Source: kw7HGENm1D.exe, 00000000.00000002.511088441.00000000039C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClient.dll" vs kw7HGENm1D.exe
      Source: kw7HGENm1D.exe, 00000000.00000003.354611004.0000000003ACC000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs kw7HGENm1D.exe
      Source: kw7HGENm1D.exe, 00000000.00000003.354611004.0000000003ACC000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs kw7HGENm1D.exe
      Source: kw7HGENm1D.exe, 00000000.00000003.354611004.0000000003ACC000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs kw7HGENm1D.exe
      Source: kw7HGENm1D.exe, 00000000.00000002.513527351.0000000005AD0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs kw7HGENm1D.exe
      Source: kw7HGENm1D.exe, 00000000.00000002.512440128.0000000004BC0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs kw7HGENm1D.exe
      Source: kw7HGENm1D.exe, 00000000.00000002.510127578.0000000003689000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs kw7HGENm1D.exe
      Source: kw7HGENm1D.exe, 00000000.00000002.512219662.0000000004B10000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs kw7HGENm1D.exe
      Source: kw7HGENm1D.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
      Source: kw7HGENm1D.exe, type: SAMPLEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: kw7HGENm1D.exe, type: SAMPLEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: kw7HGENm1D.exe, type: SAMPLEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.kw7HGENm1D.exe.4bf0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.4bf0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.4bc0000.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.4bc0000.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.5f20000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5f20000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.5f20000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5f20000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.4bf0000.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.4bf0000.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.4bf4629.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.4bf4629.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.26ba7a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.26ba7a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.3696f20.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.3696f20.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.393e9b7.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.393e9b7.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.3696f20.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.3696f20.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.5e60000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5e60000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.5e50000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5e50000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.5ee0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5ee0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.369b549.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.369b549.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.5eee8a4.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5eee8a4.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.5e60000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5e60000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.3.kw7HGENm1D.exe.3af1829.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.3.kw7HGENm1D.exe.3af1829.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.5e50000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5e50000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.3.kw7HGENm1D.exe.3af1829.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.kw7HGENm1D.exe.26b2d6c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.26b2d6c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.5e90000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5e90000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.5e40000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5e40000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.3a31f00.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.3a31f00.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.3a31f00.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.kw7HGENm1D.exe.3a282fb.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.3a282fb.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.3a282fb.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.kw7HGENm1D.exe.5ed0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5ed0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.26ba7a0.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.26ba7a0.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.5ec0000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5ec0000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.5ed0000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5ed0000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.3.kw7HGENm1D.exe.3add1fe.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.3.kw7HGENm1D.exe.3add1fe.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.3.kw7HGENm1D.exe.3add1fe.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.kw7HGENm1D.exe.5ec0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5ec0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.39485bc.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.39485bc.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.5ee4c9f.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5ee4c9f.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.3.kw7HGENm1D.exe.3ad0fcc.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.3.kw7HGENm1D.exe.3ad0fcc.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.3.kw7HGENm1D.exe.3ad0fcc.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.kw7HGENm1D.exe.26b2d6c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.26b2d6c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.3939d18.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.3939d18.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.5e40000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5e40000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.0.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.0.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.0.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.kw7HGENm1D.exe.3a2365c.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.3a2365c.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.3a2365c.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.kw7HGENm1D.exe.5ee0000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.5ee0000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.3a2365c.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.3a2365c.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.kw7HGENm1D.exe.2641394.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.kw7HGENm1D.exe.3939d18.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.kw7HGENm1D.exe.3939d18.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000002.514043603.0000000005EE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.514043603.0000000005EE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000002.514025811.0000000005ED0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.514025811.0000000005ED0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000002.511088441.00000000039C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.514088521.0000000005F20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.514088521.0000000005F20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000000.236906939.0000000000082000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.512440128.0000000004BC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.512440128.0000000004BC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000003.354611004.0000000003ACC000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.513862961.0000000005E40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.513862961.0000000005E40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000002.512499976.0000000004BF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.512499976.0000000004BF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000002.513888087.0000000005E50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.513888087.0000000005E50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000002.504244186.0000000000082000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.513910421.0000000005E60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.513910421.0000000005E60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000002.508012570.0000000002631000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.513957780.0000000005E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.513957780.0000000005E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000002.514007279.0000000005EC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.514007279.0000000005EC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: Process Memory Space: kw7HGENm1D.exe PID: 1700, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: kw7HGENm1D.exeStatic PE information: Section: .rsrc ZLIB complexity 0.999698660714
      Source: kw7HGENm1D.exe, Class8.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: kw7HGENm1D.exe, Class22.csCryptographic APIs: 'CreateDecryptor'
      Source: kw7HGENm1D.exe, Class22.csCryptographic APIs: 'TransformFinalBlock'
      Source: kw7HGENm1D.exe, Class22.csCryptographic APIs: 'TransformFinalBlock'
      Source: 0.2.kw7HGENm1D.exe.80000.0.unpack, Class8.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 0.2.kw7HGENm1D.exe.80000.0.unpack, Class22.csCryptographic APIs: 'CreateDecryptor'
      Source: 0.2.kw7HGENm1D.exe.80000.0.unpack, Class22.csCryptographic APIs: 'TransformFinalBlock'
      Source: 0.2.kw7HGENm1D.exe.80000.0.unpack, Class22.csCryptographic APIs: 'TransformFinalBlock'
      Source: 0.0.kw7HGENm1D.exe.80000.0.unpack, Class8.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 0.0.kw7HGENm1D.exe.80000.0.unpack, Class8.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 0.0.kw7HGENm1D.exe.80000.0.unpack, Class8.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 0.2.kw7HGENm1D.exe.80000.0.unpack, Class8.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 0.2.kw7HGENm1D.exe.80000.0.unpack, Class8.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: kw7HGENm1D.exe, Class8.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: kw7HGENm1D.exe, Class8.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/5@16/2
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_04990F2A AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_04990EF3 AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeFile created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9AJump to behavior
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{39997603-c9cb-4099-abed-49c0195a845a}
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: kw7HGENm1D.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: kw7HGENm1D.exeVirustotal: Detection: 63%
      Source: kw7HGENm1D.exeMetadefender: Detection: 57%
      Source: kw7HGENm1D.exeReversingLabs: Detection: 88%
      Source: kw7HGENm1D.exeString found in binary or memory: BackupDnsServer-ShowInstallationDialog/InstallationDialogTitle3InstallationDialogMessage-InstallationDialogIcon7RestoreAccessControlEntries3ClearAccessControlEntries
      Source: kw7HGENm1D.exeString found in binary or memory: BackupDnsServer-ShowInstallationDialog/InstallationDialogTitle3InstallationDialogMessage-InstallationDialogIcon7RestoreAccessControlEntries3ClearAccessControlEntries
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeFile read: C:\Users\user\Desktop\kw7HGENm1D.exeJump to behavior
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
      Source: kw7HGENm1D.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: Binary string: C:\Users\Enc\Desktop\AllPassWords\MultiCore-master\MyClientPlugin\obj\Debug\Client.pdb source: kw7HGENm1D.exe, 00000000.00000003.354611004.0000000003ACC000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Enc\Desktop\MultiCore-master\MultiCore-master\MyClientPlugin\obj\Debug\Client.pdb source: kw7HGENm1D.exe, 00000000.00000002.511088441.00000000039C0000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Enc\Desktop\MultiCore-master\MultiCore-master\MyClientPlugin\obj\Debug\Client.pdb| source: kw7HGENm1D.exe, 00000000.00000002.511088441.00000000039C0000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Enc\Desktop\AllPassWords\MultiCore-master\MyClientPlugin\obj\Debug\Client.pdbD source: kw7HGENm1D.exe, 00000000.00000003.354611004.0000000003ACC000.00000004.00000001.sdmp
      Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: kw7HGENm1D.exe, 00000000.00000003.354611004.0000000003ACC000.00000004.00000001.sdmp
      Source: Binary string: mscorrc.pdb source: kw7HGENm1D.exe, 00000000.00000002.512219662.0000000004B10000.00000002.00000001.sdmp

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: kw7HGENm1D.exe, Class8.cs.Net Code: smethod_69 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: kw7HGENm1D.exe, Class27.cs.Net Code: smethod_0 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.2.kw7HGENm1D.exe.80000.0.unpack, Class8.cs.Net Code: smethod_69 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.2.kw7HGENm1D.exe.80000.0.unpack, Class27.cs.Net Code: smethod_0 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.0.kw7HGENm1D.exe.80000.0.unpack, Class8.cs.Net Code: smethod_69 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.0.kw7HGENm1D.exe.80000.0.unpack, Class27.cs.Net Code: smethod_0 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_00892C0D push cs; ret
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_04862721 push eax; mov dword ptr [esp], ecx

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeFile opened: C:\Users\user\Desktop\kw7HGENm1D.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWindow / User API: threadDelayed 398
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWindow / User API: foregroundWindowGot 903
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWindow / User API: foregroundWindowGot 436
      Source: C:\Users\user\Desktop\kw7HGENm1D.exe TID: 5776Thread sleep time: -1844674407370954s >= -30000s
      Source: C:\Users\user\Desktop\kw7HGENm1D.exe TID: 2968Thread sleep time: -620000s >= -30000s
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_04990BB6 GetSystemInfo,
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeThread delayed: delay time: 922337203685477
      Source: kw7HGENm1D.exe, 00000000.00000002.513527351.0000000005AD0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: kw7HGENm1D.exe, 00000000.00000002.513527351.0000000005AD0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: kw7HGENm1D.exe, 00000000.00000002.513527351.0000000005AD0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: kw7HGENm1D.exe, 00000000.00000002.513527351.0000000005AD0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeMemory allocated: page read and write | page guard
      Source: kw7HGENm1D.exe, 00000000.00000002.509895752.000000000290B000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: kw7HGENm1D.exe, 00000000.00000002.506358105.0000000000D90000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: kw7HGENm1D.exe, 00000000.00000002.513374598.00000000059FB000.00000004.00000001.sdmpBinary or memory string: Program ManagerA
      Source: kw7HGENm1D.exe, 00000000.00000002.506358105.0000000000D90000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: kw7HGENm1D.exe, 00000000.00000002.506358105.0000000000D90000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
      Source: kw7HGENm1D.exe, 00000000.00000002.509913503.0000000002911000.00000004.00000001.sdmpBinary or memory string: Program Managerp
      Source: kw7HGENm1D.exe, 00000000.00000002.509855941.0000000002901000.00000004.00000001.sdmpBinary or memory string: Program ManagerL
      Source: kw7HGENm1D.exe, 00000000.00000003.429694767.0000000005A02000.00000004.00000001.sdmpBinary or memory string: Program Manager)
      Source: kw7HGENm1D.exe, 00000000.00000002.513374598.00000000059FB000.00000004.00000001.sdmpBinary or memory string: Program ManagerU
      Source: kw7HGENm1D.exe, 00000000.00000002.506358105.0000000000D90000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
      Source: kw7HGENm1D.exe, 00000000.00000002.506358105.0000000000D90000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: kw7HGENm1D.exe, 00000000.00000002.508489108.0000000002742000.00000004.00000001.sdmpBinary or memory string: Program Manager|9
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_04992CD6 GetSystemTimes,
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_0089AF9A GetUserNameW,
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: kw7HGENm1D.exe, type: SAMPLE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.4bf0000.16.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.4bf0000.16.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.4bf4629.15.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.3696f20.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.3696f20.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.369b549.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.0.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000000.236906939.0000000000082000.00000002.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.510127578.0000000003689000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.512499976.0000000004BF0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.504244186.0000000000082000.00000002.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: kw7HGENm1D.exe PID: 1700, type: MEMORY
      Tries to harvest and steal browser information (history, passwords, etc)Show sources
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost.IClientNetworkHost.Connected
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost.IClientNetworkHost.get_Connected
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost.IClientDataHost.Variables
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost.IClientDataHost.get_Variables
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost.IClientDataHost.BuilderSettings
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost.IClientDataHost.get_BuilderSettings
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost.IClientDataHost.ClientSettings
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost.IClientDataHost.get_ClientSettings
      Source: kw7HGENm1D.exe, 00000000.00000003.354611004.0000000003ACC000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
      Source: kw7HGENm1D.exe, 00000000.00000002.512440128.0000000004BC0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost.IClientNetworkHost.Connected
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost.IClientNetworkHost.get_Connected
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost.IClientDataHost.Variables
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost.IClientDataHost.get_Variables
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost.IClientDataHost.BuilderSettings
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost.IClientDataHost.get_BuilderSettings
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost.IClientDataHost.ClientSettings
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost.IClientDataHost.get_ClientSettings
      Source: kw7HGENm1D.exeString found in binary or memory: NanoCore.ClientPluginHost
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: kw7HGENm1D.exe, type: SAMPLE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.4bf0000.16.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.4bf0000.16.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.4bf4629.15.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.3696f20.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.3696f20.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.369b549.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.0.kw7HGENm1D.exe.80000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000000.236906939.0000000000082000.00000002.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.510127578.0000000003689000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.512499976.0000000004BF0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.504244186.0000000000082000.00000002.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: kw7HGENm1D.exe PID: 1700, type: MEMORY
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_0499247A bind,
      Source: C:\Users\user\Desktop\kw7HGENm1D.exeCode function: 0_2_04992428 bind,

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation1Path InterceptionAccess Token Manipulation1Disable or Modify Tools1OS Credential Dumping1System Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsCommand and Scripting Interpreter2Boot or Logon Initialization ScriptsProcess Injection1Deobfuscate/Decode Files or Information1Input Capture11Account Discovery1Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerSystem Information Discovery4SMB/Windows Admin SharesInput Capture11Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing12NTDSSecurity Software Discovery11Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol1Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion21Cached Domain CredentialsVirtualization/Sandbox Evasion21VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol21Jamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation1DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection1Proc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

      Behavior Graph

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      kw7HGENm1D.exe63%VirustotalBrowse
      kw7HGENm1D.exe60%MetadefenderBrowse
      kw7HGENm1D.exe89%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
      kw7HGENm1D.exe100%AviraHEUR/AGEN.1108376
      kw7HGENm1D.exe100%Joe Sandbox ML

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      0.2.kw7HGENm1D.exe.4bf0000.16.unpack100%AviraTR/NanoCore.fadteDownload File
      0.2.kw7HGENm1D.exe.80000.0.unpack100%AviraHEUR/AGEN.1108376Download File
      0.0.kw7HGENm1D.exe.80000.0.unpack100%AviraHEUR/AGEN.1108376Download File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      backupnewhost.duckdns.org0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      newhost.publicvm.com
      52.91.94.222
      truefalse
        high
        backupnewhost.duckdns.org
        3.92.185.198
        truetrue
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          newhost.publicvm.comfalse
            high
            backupnewhost.duckdns.orgtrue
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            https://ac.ecosia.org/autocomplete?q=kw7HGENm1D.exe, 00000000.00000002.510475412.0000000003765000.00000004.00000001.sdmpfalse
              high
              https://duckduckgo.com/chrome_newtabkw7HGENm1D.exe, 00000000.00000003.436320393.0000000003AF2000.00000004.00000001.sdmp, kw7HGENm1D.exe, 00000000.00000002.508807205.00000000027AD000.00000004.00000001.sdmpfalse
                high
                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=kw7HGENm1D.exe, 00000000.00000002.510475412.0000000003765000.00000004.00000001.sdmp, kw7HGENm1D.exe, 00000000.00000003.436320393.0000000003AF2000.00000004.00000001.sdmp, kw7HGENm1D.exe, 00000000.00000002.508807205.00000000027AD000.00000004.00000001.sdmpfalse
                  high
                  https://duckduckgo.com/chrome_newtabpkw7HGENm1D.exe, 00000000.00000002.510475412.0000000003765000.00000004.00000001.sdmpfalse
                    high
                    https://duckduckgo.com/ac/?q=kw7HGENm1D.exe, 00000000.00000002.510475412.0000000003765000.00000004.00000001.sdmp, kw7HGENm1D.exe, 00000000.00000003.436320393.0000000003AF2000.00000004.00000001.sdmp, kw7HGENm1D.exe, 00000000.00000002.508807205.00000000027AD000.00000004.00000001.sdmpfalse
                      high
                      https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchkw7HGENm1D.exe, 00000000.00000003.436320393.0000000003AF2000.00000004.00000001.sdmpfalse
                        high
                        https://www.google.com/images/branding/product/ico/googleg_lodp.icokw7HGENm1D.exe, 00000000.00000002.510475412.0000000003765000.00000004.00000001.sdmpfalse
                          high
                          https://search.yahoo.com/searchkw7HGENm1D.exe, 00000000.00000002.510475412.0000000003765000.00000004.00000001.sdmpfalse
                            high
                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=kw7HGENm1D.exe, 00000000.00000002.510475412.0000000003765000.00000004.00000001.sdmpfalse
                              high
                              https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=kw7HGENm1D.exe, 00000000.00000002.510475412.0000000003765000.00000004.00000001.sdmp, kw7HGENm1D.exe, 00000000.00000003.436320393.0000000003AF2000.00000004.00000001.sdmpfalse
                                high

                                Contacted IPs

                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs

                                Public

                                IPDomainCountryFlagASNASN NameMalicious
                                52.91.94.222
                                newhost.publicvm.comUnited States
                                14618AMAZON-AESUSfalse
                                3.92.185.198
                                backupnewhost.duckdns.orgUnited States
                                14618AMAZON-AESUStrue

                                General Information

                                Joe Sandbox Version:33.0.0 White Diamond
                                Analysis ID:451838
                                Start date:21.07.2021
                                Start time:12:11:10
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 7m 39s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:kw7HGENm1D.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:24
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@1/5@16/2
                                EGA Information:Failed
                                HDC Information:
                                • Successful, ratio: 0.3% (good quality ratio 0.1%)
                                • Quality average: 23.6%
                                • Quality standard deviation: 31.2%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .exe
                                Warnings:
                                Show All
                                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                • TCP Packets have been reduced to 100
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 93.184.220.29, 52.147.198.201, 20.82.210.154, 104.43.193.48, 168.61.161.212, 23.54.113.53, 23.54.113.104, 23.0.174.200, 23.0.174.185, 40.112.88.60, 23.10.249.43, 23.10.249.26, 20.50.102.62
                                • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, cs9.wac.phicdn.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                12:12:05API Interceptor1089x Sleep call for process: kw7HGENm1D.exe modified

                                Joe Sandbox View / Context

                                IPs

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                3.92.185.198CM45.vbsGet hashmaliciousBrowse

                                  Domains

                                  No context

                                  ASN

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  AMAZON-AESUSTFG18FA4eDGet hashmaliciousBrowse
                                  • 44.214.154.33
                                  StyBaUxNYqGet hashmaliciousBrowse
                                  • 52.73.216.92
                                  qgQgEjI283Get hashmaliciousBrowse
                                  • 100.24.228.158
                                  jhUxzb7jPWGet hashmaliciousBrowse
                                  • 34.205.150.10
                                  DDA9.dllGet hashmaliciousBrowse
                                  • 52.20.197.7
                                  1.dllGet hashmaliciousBrowse
                                  • 3.211.138.232
                                  4fZX8fJwHn.dllGet hashmaliciousBrowse
                                  • 54.235.190.106
                                  lpaBPnb1OB.exeGet hashmaliciousBrowse
                                  • 54.243.175.83
                                  v6clgzEGCbGet hashmaliciousBrowse
                                  • 34.237.123.218
                                  TNT Shipment.exeGet hashmaliciousBrowse
                                  • 3.208.234.55
                                  sap7ltEdFxGet hashmaliciousBrowse
                                  • 44.201.155.123
                                  Dvf7OP92yJGet hashmaliciousBrowse
                                  • 174.129.61.100
                                  Vk3A1yJJMgGet hashmaliciousBrowse
                                  • 44.221.179.16
                                  a1sMR3Vj8oGet hashmaliciousBrowse
                                  • 34.237.211.216
                                  lMQ74zpulc.exeGet hashmaliciousBrowse
                                  • 3.223.115.185
                                  Af1Fnq4I4GGet hashmaliciousBrowse
                                  • 100.25.242.76
                                  r6hA4B4FqSGet hashmaliciousBrowse
                                  • 44.221.167.150
                                  8wzyljMmmnGet hashmaliciousBrowse
                                  • 34.202.220.187
                                  appointment letter.xlsxGet hashmaliciousBrowse
                                  • 23.21.157.88
                                  FN0ZF2Nm21Get hashmaliciousBrowse
                                  • 54.24.234.10
                                  AMAZON-AESUSTFG18FA4eDGet hashmaliciousBrowse
                                  • 44.214.154.33
                                  StyBaUxNYqGet hashmaliciousBrowse
                                  • 52.73.216.92
                                  qgQgEjI283Get hashmaliciousBrowse
                                  • 100.24.228.158
                                  jhUxzb7jPWGet hashmaliciousBrowse
                                  • 34.205.150.10
                                  DDA9.dllGet hashmaliciousBrowse
                                  • 52.20.197.7
                                  1.dllGet hashmaliciousBrowse
                                  • 3.211.138.232
                                  4fZX8fJwHn.dllGet hashmaliciousBrowse
                                  • 54.235.190.106
                                  lpaBPnb1OB.exeGet hashmaliciousBrowse
                                  • 54.243.175.83
                                  v6clgzEGCbGet hashmaliciousBrowse
                                  • 34.237.123.218
                                  TNT Shipment.exeGet hashmaliciousBrowse
                                  • 3.208.234.55
                                  sap7ltEdFxGet hashmaliciousBrowse
                                  • 44.201.155.123
                                  Dvf7OP92yJGet hashmaliciousBrowse
                                  • 174.129.61.100
                                  Vk3A1yJJMgGet hashmaliciousBrowse
                                  • 44.221.179.16
                                  a1sMR3Vj8oGet hashmaliciousBrowse
                                  • 34.237.211.216
                                  lMQ74zpulc.exeGet hashmaliciousBrowse
                                  • 3.223.115.185
                                  Af1Fnq4I4GGet hashmaliciousBrowse
                                  • 100.25.242.76
                                  r6hA4B4FqSGet hashmaliciousBrowse
                                  • 44.221.167.150
                                  8wzyljMmmnGet hashmaliciousBrowse
                                  • 34.202.220.187
                                  appointment letter.xlsxGet hashmaliciousBrowse
                                  • 23.21.157.88
                                  FN0ZF2Nm21Get hashmaliciousBrowse
                                  • 54.24.234.10

                                  JA3 Fingerprints

                                  No context

                                  Dropped Files

                                  No context

                                  Created / dropped Files

                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                  Process:C:\Users\user\Desktop\kw7HGENm1D.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):320
                                  Entropy (8bit):6.76696567289067
                                  Encrypted:false
                                  SSDEEP:6:nprYhSjkONZdGzzG31sV2sS4Ct0r2xprYhSjkONZdGzzG31sV2sS4Ct0r29:npbjkONZdGnmgTS4k0qxpbjkONZdGnmJ
                                  MD5:FEB350949251AC8F3E7783A2BDE88A51
                                  SHA1:82FE012F0CC9CF457701EC6DDE99AF73BD73B931
                                  SHA-256:A32EA0E8DC38655BAC2BA4332C1A231D2B012CE638602F1826B220BA4D91CA61
                                  SHA-512:7E05DD0845D27D3493728F419506098FE15D17B8B96D7F305A6A30E56B17FAF9FBBE2767CC8B1510274503343DDCC789CB1E275CEF6EA45631AFABD2C40463E0
                                  Malicious:false
                                  Reputation:low
                                  Preview: ...L=..+.[.1u.Pp.L.*j.m.2FL'7..[..|p.W.i0..QR...6d1.....6~\./.o<..MyFP...A.Rlb....k.CD.S......P...FK.....81....^..P.w.. ...z`c.=.@.......G..7....n..)..s..O....L=..+.[.1u.Pp.L.*j.m.2FL'7..[..|p.W.i0..QR...6d1.....6~\./.o<..MyFP...A.Rlb....k.CD.S......P...FK.....81....^..P.w.. ...z`c.=.@.......G..7....n..)..s..O.
                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                  Process:C:\Users\user\Desktop\kw7HGENm1D.exe
                                  File Type:International EBCDIC text, with no line terminators
                                  Category:dropped
                                  Size (bytes):8
                                  Entropy (8bit):3.0
                                  Encrypted:false
                                  SSDEEP:3:njp8:nje
                                  MD5:26AA48EDF508A0DE24C4A8A90EC10DDD
                                  SHA1:62B2BB7EFED4F798F6665296A329CB61F3AA85E4
                                  SHA-256:04C2D74AAAF3E89E878078F9B94E1CEDE00C5E12B30BF02A86C2A1172D694868
                                  SHA-512:191AA80A2D46FD437F5EFD0CD54C9AAE49F6CBB08F139D362FDE924E9227A5842CA3E6B828ADF56450ED9E6F3AF074D0763893DFCA1EB2D58E45F54E395867DC
                                  Malicious:true
                                  Reputation:low
                                  Preview: ..fm{L.H
                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bak
                                  Process:C:\Users\user\Desktop\kw7HGENm1D.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):24
                                  Entropy (8bit):4.501629167387823
                                  Encrypted:false
                                  SSDEEP:3:9bzY6oRDIvYk:RzWDI3
                                  MD5:ACD3FB4310417DC77FE06F15B0E353E6
                                  SHA1:80E7002E655EB5765FDEB21114295CB96AD9D5EB
                                  SHA-256:DC3AE604991C9BB8FF8BC4502AE3D0DB8A3317512C0F432490B103B89C1A4368
                                  SHA-512:DA46A917DB6276CD4528CFE4AD113292D873CA2EBE53414730F442B83502E5FAF3D1AE87BFA295ADF01E3B44FDBCE239E21A318BFB2CCD1F4753846CB21F6F97
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview: 9iH...}Z.4..f..J".C;"a
                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                  Process:C:\Users\user\Desktop\kw7HGENm1D.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):64
                                  Entropy (8bit):5.320159765557392
                                  Encrypted:false
                                  SSDEEP:3:9bzY6oRDIvYVsRLY6oRDT6P2bfVn1:RzWDIfRWDT621
                                  MD5:BB0F9B9992809E733EFFF8B0E562CFD6
                                  SHA1:F0BAB3CF73A04F5A689E6AFC764FEE9276992742
                                  SHA-256:C48F04FE7525AA3A3F9540889883F649726233DE021724823720A59B4F37CEAC
                                  SHA-512:AE4280AA460DC1C0301D458A3A443F6884A0BE37481737B2ADAFD72C33C55F09BED88ED239C91FE6F19CA137AC3CD7C9B8454C21D3F8E759687F701C8B3C7A16
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview: 9iH...}Z.4..f..J".C;"a9iH...}Z.4..f.~a........~.~.......3.U.
                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                  Process:C:\Users\user\Desktop\kw7HGENm1D.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):379672
                                  Entropy (8bit):7.999528303288865
                                  Encrypted:true
                                  SSDEEP:6144:K+3c0wsFFUOVpzvbpRTELXdC53fz1TQdDjZvW+ZQJ03SDjCkI7Nh07MyOFQ9wv2T:ir0bp7PRZcdnZ++Zj3IjKhjOSv9KFBH
                                  MD5:543352056C5CB25E9BC2BDEAF2BBF9E2
                                  SHA1:2D1E2BA09C295FB6631F7EDCD3280894FE7D5125
                                  SHA-256:11227762F426CC8FA6FF700328732AA87A44807AA7C65FA6D97FDB47917CF8F6
                                  SHA-512:53DC5864B019D6BE0588D8CC9055414A933BA6923E572CB1AE3DE6848ED67FC65AA237C94F6397387C2555E84C88EE38D0B7BF7F4958C351683EF324D2874315
                                  Malicious:false
                                  Reputation:low
                                  Preview: E..v..}3...$..n).E...I.2HbzR......,..T.7....A.Qy.?9AM>..Q..O.Yr..,...5...X_...;?..!....?...........b....N..<.}/0.E........{9.....~O.x.^.a..1a.@....`4qZ....H...AWt]..@...w.v........^A..<X..TQ...aO..R..z`Xg..@..C...c......+..]...b.Y....!.O.!c8V+4..zl.hEV.. }.*.wq.K..v @.........f..y.Ex.#*;...P{.Z.....M.4.....7...7..nj.<.|...:.............v.#...{....V,#S..R]~m=..$.............0...}y3.e...V..@@....K.e.....p..$<0V...$g.<).w..#..vLL.\.Y.)}......[.....M[C..H..n|F..e.5.C.....7)..r?!.n...*..k.........Ny...rY..Q......$J|..o#....w..>.........;(.J}.......V..E..m*..5XLUi y.[[.......rW.Low../...9G...g..y._.WAu.j...,...}.3.....U.B.y.'..P...:.fX.&.N....#.......W..GTEC..u.I)Et...>..5Fs.r2.Jk.....>.u......D..r.P..;.:..q.O.....Z....... G5~Hk.M..t.T.....[.`...q1..q.....\...s...../..@\..iQK..E&..e.*.0..l....@.bR...ww:..jG...2Z...v.H..=.8...w.J..-F?W.)...S..u..MIM`L...C...-..f...IK....].eE8.6#`.5.B.........E.q+.....(}.o..c....n]..H.v.. ....z..<C.....Q]...,..O....

                                  Static File Info

                                  General

                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.324667002820176
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:kw7HGENm1D.exe
                                  File size:160768
                                  MD5:a854bd1a3ff6d359a5e2e76154892444
                                  SHA1:b8de8cb81adbb8cc5456a2100ffd3502548b0c2c
                                  SHA256:8fb35304f24a6348adbd96f2ece69cdc23aa2442cfe28ca910ee31b48fd43632
                                  SHA512:ebb2d7a7b43f826ddf84aa6374e2c006fdbc2fb8aa924f485b762546eca349f889bb2db50190ca80755741a15542a90c3b0ff035e354c7186fc24c13a7807b19
                                  SSDEEP:3072:2JEZzJZ5WY+apEbTmFxjpcJslEjqZ4UHtbrObVeHCtEGMyVuz5rMRyJJG+pXSPLE:HZT5TbjiJslEjqZ4UHtbYVehjauz5+Ct
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................`.......1... ...@....@.. .....................................................................

                                  File Icon

                                  Icon Hash:00828e8e8686b000

                                  Static PE Info

                                  General

                                  Entrypoint:0x41312e
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                  DLL Characteristics:
                                  Time Stamp:0x54E927A1 [Sun Feb 22 00:49:37 2015 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:v2.0.50727
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                  Entrypoint Preview

                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al

                                  Data Directories

                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x130e00x4b.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x15da0.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x2a0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                  Sections

                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x111340x11200False0.452953923358data5.6930506473IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                  .rsrc0x140000x15da00x15e00False0.999698660714data7.9977388881IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x2a0000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                  Resources

                                  NameRVASizeTypeLanguageCountry
                                  RT_RCDATA0x140580x15d48TIM image, (51044,50643)

                                  Imports

                                  DLLImport
                                  mscoree.dll_CorExeMain

                                  Network Behavior

                                  Snort IDS Alerts

                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  07/21/21-12:12:59.033903TCP2025019ET TROJAN Possible NanoCore C2 60B497219911192.168.2.53.92.185.198
                                  07/21/21-12:13:05.270177TCP2025019ET TROJAN Possible NanoCore C2 60B497229911192.168.2.53.92.185.198
                                  07/21/21-12:13:11.269344TCP2025019ET TROJAN Possible NanoCore C2 60B497259911192.168.2.53.92.185.198
                                  07/21/21-12:13:17.441073TCP2025019ET TROJAN Possible NanoCore C2 60B497319911192.168.2.53.92.185.198
                                  07/21/21-12:13:23.621332TCP2025019ET TROJAN Possible NanoCore C2 60B497329911192.168.2.53.92.185.198
                                  07/21/21-12:13:29.585150TCP2025019ET TROJAN Possible NanoCore C2 60B497339911192.168.2.53.92.185.198
                                  07/21/21-12:13:35.610599TCP2025019ET TROJAN Possible NanoCore C2 60B497349911192.168.2.53.92.185.198
                                  07/21/21-12:13:41.778497TCP2025019ET TROJAN Possible NanoCore C2 60B497359911192.168.2.53.92.185.198
                                  07/21/21-12:13:52.234768TCP2025019ET TROJAN Possible NanoCore C2 60B497399911192.168.2.53.92.185.198
                                  07/21/21-12:13:59.650035TCP2025019ET TROJAN Possible NanoCore C2 60B497409911192.168.2.53.92.185.198
                                  07/21/21-12:14:05.853550TCP2025019ET TROJAN Possible NanoCore C2 60B497419911192.168.2.53.92.185.198
                                  07/21/21-12:14:11.894029TCP2025019ET TROJAN Possible NanoCore C2 60B497429911192.168.2.53.92.185.198

                                  Network Port Distribution

                                  TCP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 21, 2021 12:12:06.833390951 CEST497009911192.168.2.552.91.94.222
                                  Jul 21, 2021 12:12:09.837888956 CEST497009911192.168.2.552.91.94.222
                                  Jul 21, 2021 12:12:15.854062080 CEST497009911192.168.2.552.91.94.222
                                  Jul 21, 2021 12:12:24.250699043 CEST497159911192.168.2.552.91.94.222
                                  Jul 21, 2021 12:12:27.261265039 CEST497159911192.168.2.552.91.94.222
                                  Jul 21, 2021 12:12:33.277561903 CEST497159911192.168.2.552.91.94.222
                                  Jul 21, 2021 12:12:41.606863976 CEST497189911192.168.2.552.91.94.222
                                  Jul 21, 2021 12:12:44.606496096 CEST497189911192.168.2.552.91.94.222
                                  Jul 21, 2021 12:12:50.607012987 CEST497189911192.168.2.552.91.94.222
                                  Jul 21, 2021 12:12:58.883095026 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:58.984275103 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:58.995517969 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.033902884 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.146291971 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.146389008 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.286824942 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.286995888 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.388211966 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.405747890 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.547003031 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.548147917 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.688916922 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.689100981 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.689591885 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.689627886 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.689651966 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.689676046 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.689677000 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.689724922 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.689770937 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.689819098 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.689908028 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.689933062 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.689956903 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.689963102 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.689982891 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.690025091 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.690037966 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.690059900 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.690098047 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.690124989 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.690706968 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.790360928 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.790412903 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.790436029 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.790461063 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.790484905 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.790515900 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.790570974 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.790642977 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.790761948 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.790798903 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.790832043 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.790863991 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.790863991 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.790889978 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.790896893 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.790923119 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.790940046 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.790962934 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.790977001 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.791014910 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.791049957 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.791096926 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.791177034 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.791178942 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.791215897 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.791241884 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.791253090 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.791273117 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.791285992 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.791301012 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.791322947 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.791325092 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.791357994 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.791387081 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.891580105 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.891621113 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.891652107 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.891678095 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.891814947 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.891839981 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.891928911 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.891972065 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.891988039 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.892019987 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.892049074 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.892080069 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.892111063 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.892132998 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.892211914 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.892390013 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.892429113 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.892461061 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.892524958 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.892544985 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.892642021 CEST497219911192.168.2.53.92.185.198
                                  Jul 21, 2021 12:12:59.892719984 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.892755032 CEST9911497213.92.185.198192.168.2.5
                                  Jul 21, 2021 12:12:59.892771006 CEST497219911192.168.2.53.92.185.198

                                  UDP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 21, 2021 12:11:58.571414948 CEST5221253192.168.2.58.8.8.8
                                  Jul 21, 2021 12:11:58.585073948 CEST53522128.8.8.8192.168.2.5
                                  Jul 21, 2021 12:11:58.648004055 CEST5430253192.168.2.58.8.8.8
                                  Jul 21, 2021 12:11:58.661545992 CEST53543028.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:00.630430937 CEST5378453192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:00.642855883 CEST53537848.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:01.362792969 CEST6530753192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:01.389211893 CEST53653078.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:01.419464111 CEST6434453192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:01.432765007 CEST53643448.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:01.489475012 CEST6206053192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:01.502017975 CEST53620608.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:02.216576099 CEST6180553192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:02.231194973 CEST53618058.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:03.049134016 CEST5479553192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:03.062693119 CEST53547958.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:04.177443981 CEST4955753192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:04.193108082 CEST53495578.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:05.875226974 CEST6173353192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:05.888817072 CEST53617338.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:06.695765018 CEST6544753192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:06.822557926 CEST53654478.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:06.844433069 CEST5244153192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:06.857078075 CEST53524418.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:07.685858965 CEST6217653192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:07.698436975 CEST53621768.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:08.188601017 CEST5959653192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:08.209978104 CEST53595968.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:08.585896969 CEST6529653192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:08.598407030 CEST53652968.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:09.395467043 CEST6318353192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:09.408433914 CEST53631838.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:10.190834045 CEST6015153192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:10.206366062 CEST53601518.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:10.873034000 CEST5696953192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:10.886425972 CEST53569698.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:18.415663958 CEST5516153192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:18.467819929 CEST53551618.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:24.108674049 CEST5475753192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:24.249049902 CEST53547578.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:36.491069078 CEST4999253192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:36.505711079 CEST53499928.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:41.589500904 CEST6007553192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:41.602220058 CEST53600758.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:54.473658085 CEST5501653192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:54.508491039 CEST53550168.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:56.353270054 CEST6434553192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:56.369292021 CEST53643458.8.8.8192.168.2.5
                                  Jul 21, 2021 12:12:58.755163908 CEST5712853192.168.2.58.8.8.8
                                  Jul 21, 2021 12:12:58.881452084 CEST53571288.8.8.8192.168.2.5
                                  Jul 21, 2021 12:13:05.041157007 CEST5479153192.168.2.58.8.8.8
                                  Jul 21, 2021 12:13:05.165946960 CEST53547918.8.8.8192.168.2.5
                                  Jul 21, 2021 12:13:10.946288109 CEST5046353192.168.2.58.8.8.8
                                  Jul 21, 2021 12:13:10.974086046 CEST53504638.8.8.8192.168.2.5
                                  Jul 21, 2021 12:13:11.152848959 CEST5039453192.168.2.58.8.8.8
                                  Jul 21, 2021 12:13:11.166309118 CEST53503948.8.8.8192.168.2.5
                                  Jul 21, 2021 12:13:15.680049896 CEST5853053192.168.2.58.8.8.8
                                  Jul 21, 2021 12:13:15.697999001 CEST53585308.8.8.8192.168.2.5
                                  Jul 21, 2021 12:13:17.289640903 CEST5381353192.168.2.58.8.8.8
                                  Jul 21, 2021 12:13:17.303548098 CEST53538138.8.8.8192.168.2.5
                                  Jul 21, 2021 12:13:23.504897118 CEST6373253192.168.2.58.8.8.8
                                  Jul 21, 2021 12:13:23.518405914 CEST53637328.8.8.8192.168.2.5
                                  Jul 21, 2021 12:13:29.468622923 CEST5734453192.168.2.58.8.8.8
                                  Jul 21, 2021 12:13:29.481996059 CEST53573448.8.8.8192.168.2.5
                                  Jul 21, 2021 12:13:35.474404097 CEST5445053192.168.2.58.8.8.8
                                  Jul 21, 2021 12:13:35.486541033 CEST53544508.8.8.8192.168.2.5
                                  Jul 21, 2021 12:13:41.555166006 CEST5926153192.168.2.58.8.8.8
                                  Jul 21, 2021 12:13:41.674238920 CEST53592618.8.8.8192.168.2.5
                                  Jul 21, 2021 12:13:45.435658932 CEST5715153192.168.2.58.8.8.8
                                  Jul 21, 2021 12:13:45.471635103 CEST53571518.8.8.8192.168.2.5
                                  Jul 21, 2021 12:13:47.633845091 CEST5941353192.168.2.58.8.8.8
                                  Jul 21, 2021 12:13:47.660387993 CEST53594138.8.8.8192.168.2.5
                                  Jul 21, 2021 12:13:47.726733923 CEST6051653192.168.2.58.8.8.8
                                  Jul 21, 2021 12:13:47.739984989 CEST53605168.8.8.8192.168.2.5
                                  Jul 21, 2021 12:13:52.119225979 CEST5164953192.168.2.58.8.8.8
                                  Jul 21, 2021 12:13:52.131959915 CEST53516498.8.8.8192.168.2.5
                                  Jul 21, 2021 12:13:59.396620035 CEST6508653192.168.2.58.8.8.8
                                  Jul 21, 2021 12:13:59.520096064 CEST53650868.8.8.8192.168.2.5
                                  Jul 21, 2021 12:14:05.612689018 CEST5643253192.168.2.58.8.8.8
                                  Jul 21, 2021 12:14:05.725886106 CEST53564328.8.8.8192.168.2.5
                                  Jul 21, 2021 12:14:11.677594900 CEST5292953192.168.2.58.8.8.8
                                  Jul 21, 2021 12:14:11.792047024 CEST53529298.8.8.8192.168.2.5

                                  DNS Queries

                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  Jul 21, 2021 12:12:06.695765018 CEST192.168.2.58.8.8.80x6c37Standard query (0)newhost.publicvm.comA (IP address)IN (0x0001)
                                  Jul 21, 2021 12:12:24.108674049 CEST192.168.2.58.8.8.80x6d6dStandard query (0)newhost.publicvm.comA (IP address)IN (0x0001)
                                  Jul 21, 2021 12:12:41.589500904 CEST192.168.2.58.8.8.80x9affStandard query (0)newhost.publicvm.comA (IP address)IN (0x0001)
                                  Jul 21, 2021 12:12:58.755163908 CEST192.168.2.58.8.8.80xe1eaStandard query (0)backupnewhost.duckdns.orgA (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:05.041157007 CEST192.168.2.58.8.8.80x7169Standard query (0)backupnewhost.duckdns.orgA (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:11.152848959 CEST192.168.2.58.8.8.80xa891Standard query (0)backupnewhost.duckdns.orgA (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:17.289640903 CEST192.168.2.58.8.8.80x4059Standard query (0)backupnewhost.duckdns.orgA (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:23.504897118 CEST192.168.2.58.8.8.80xb620Standard query (0)backupnewhost.duckdns.orgA (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:29.468622923 CEST192.168.2.58.8.8.80xe44cStandard query (0)backupnewhost.duckdns.orgA (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:35.474404097 CEST192.168.2.58.8.8.80xbc47Standard query (0)backupnewhost.duckdns.orgA (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:41.555166006 CEST192.168.2.58.8.8.80x4e8aStandard query (0)backupnewhost.duckdns.orgA (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:47.726733923 CEST192.168.2.58.8.8.80x8e5aStandard query (0)backupnewhost.duckdns.orgA (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:52.119225979 CEST192.168.2.58.8.8.80x2b2fStandard query (0)backupnewhost.duckdns.orgA (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:59.396620035 CEST192.168.2.58.8.8.80xbf77Standard query (0)backupnewhost.duckdns.orgA (IP address)IN (0x0001)
                                  Jul 21, 2021 12:14:05.612689018 CEST192.168.2.58.8.8.80xcad5Standard query (0)backupnewhost.duckdns.orgA (IP address)IN (0x0001)
                                  Jul 21, 2021 12:14:11.677594900 CEST192.168.2.58.8.8.80xa7c2Standard query (0)backupnewhost.duckdns.orgA (IP address)IN (0x0001)

                                  DNS Answers

                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  Jul 21, 2021 12:12:06.822557926 CEST8.8.8.8192.168.2.50x6c37No error (0)newhost.publicvm.com52.91.94.222A (IP address)IN (0x0001)
                                  Jul 21, 2021 12:12:24.249049902 CEST8.8.8.8192.168.2.50x6d6dNo error (0)newhost.publicvm.com52.91.94.222A (IP address)IN (0x0001)
                                  Jul 21, 2021 12:12:41.602220058 CEST8.8.8.8192.168.2.50x9affNo error (0)newhost.publicvm.com52.91.94.222A (IP address)IN (0x0001)
                                  Jul 21, 2021 12:12:58.881452084 CEST8.8.8.8192.168.2.50xe1eaNo error (0)backupnewhost.duckdns.org3.92.185.198A (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:05.165946960 CEST8.8.8.8192.168.2.50x7169No error (0)backupnewhost.duckdns.org3.92.185.198A (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:11.166309118 CEST8.8.8.8192.168.2.50xa891No error (0)backupnewhost.duckdns.org3.92.185.198A (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:17.303548098 CEST8.8.8.8192.168.2.50x4059No error (0)backupnewhost.duckdns.org3.92.185.198A (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:23.518405914 CEST8.8.8.8192.168.2.50xb620No error (0)backupnewhost.duckdns.org3.92.185.198A (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:29.481996059 CEST8.8.8.8192.168.2.50xe44cNo error (0)backupnewhost.duckdns.org3.92.185.198A (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:35.486541033 CEST8.8.8.8192.168.2.50xbc47No error (0)backupnewhost.duckdns.org3.92.185.198A (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:41.674238920 CEST8.8.8.8192.168.2.50x4e8aNo error (0)backupnewhost.duckdns.org3.92.185.198A (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:47.739984989 CEST8.8.8.8192.168.2.50x8e5aNo error (0)backupnewhost.duckdns.org3.92.185.198A (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:52.131959915 CEST8.8.8.8192.168.2.50x2b2fNo error (0)backupnewhost.duckdns.org3.92.185.198A (IP address)IN (0x0001)
                                  Jul 21, 2021 12:13:59.520096064 CEST8.8.8.8192.168.2.50xbf77No error (0)backupnewhost.duckdns.org3.92.185.198A (IP address)IN (0x0001)
                                  Jul 21, 2021 12:14:05.725886106 CEST8.8.8.8192.168.2.50xcad5No error (0)backupnewhost.duckdns.org3.92.185.198A (IP address)IN (0x0001)
                                  Jul 21, 2021 12:14:11.792047024 CEST8.8.8.8192.168.2.50xa7c2No error (0)backupnewhost.duckdns.org3.92.185.198A (IP address)IN (0x0001)

                                  Code Manipulations

                                  Statistics

                                  System Behavior

                                  General

                                  Start time:12:12:04
                                  Start date:21/07/2021
                                  Path:C:\Users\user\Desktop\kw7HGENm1D.exe
                                  Wow64 process (32bit):true
                                  Commandline:'C:\Users\user\Desktop\kw7HGENm1D.exe'
                                  Imagebase:0x80000
                                  File size:160768 bytes
                                  MD5 hash:A854BD1A3FF6D359A5E2E76154892444
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.514043603.0000000005EE0000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.514043603.0000000005EE0000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.514025811.0000000005ED0000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.514025811.0000000005ED0000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.511088441.00000000039C0000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.514088521.0000000005F20000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.514088521.0000000005F20000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000000.236906939.0000000000082000.00000002.00020000.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000000.236906939.0000000000082000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.512440128.0000000004BC0000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.512440128.0000000004BC0000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.354611004.0000000003ACC000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.513862961.0000000005E40000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.513862961.0000000005E40000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.510127578.0000000003689000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.512499976.0000000004BF0000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.512499976.0000000004BF0000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.512499976.0000000004BF0000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.513888087.0000000005E50000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.513888087.0000000005E50000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.504244186.0000000000082000.00000002.00020000.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.504244186.0000000000082000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.513910421.0000000005E60000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.513910421.0000000005E60000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.508012570.0000000002631000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.513957780.0000000005E90000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.513957780.0000000005E90000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.514007279.0000000005EC0000.00000004.00000001.sdmp, Author: Florian Roth
                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.514007279.0000000005EC0000.00000004.00000001.sdmp, Author: Florian Roth
                                  Reputation:low

                                  Disassembly

                                  Code Analysis

                                  Reset < >