Loading ...

Play interactive tourEdit tour

Windows Analysis Report Orderpdf.exe

Overview

General Information

Sample Name:Orderpdf.exe
Analysis ID:458217
MD5:2849c98c8d071260b2618beacf873a98
SHA1:2431f573d98aaaaa1752b73c4a5f53e8b4660e50
SHA256:959536bfd1cf19758dde804eaf7e1d38585b573ccf4dc327898979f29cac33a8
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Nanocore RAT
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • Orderpdf.exe (PID: 1268 cmdline: 'C:\Users\user\Desktop\Orderpdf.exe' MD5: 2849C98C8D071260B2618BEACF873A98)
    • MSBuild.exe (PID: 5876 cmdline: 'C:\Users\user\Desktop\Orderpdf.exe' MD5: 88BBB7610152B48C2B3879473B17857E)
      • schtasks.exe (PID: 4436 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp86BE.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 1636 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • MSBuild.exe (PID: 6004 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0 MD5: 88BBB7610152B48C2B3879473B17857E)
    • conhost.exe (PID: 6076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "8a1be7ed-1b25-4346-8844-80b424a6", "Group": "Default", "Domain1": "sobe123.ddns.net", "Domain2": "127.0.0.1", "Port": 5656, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5024, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1018d:$x1: NanoCore.ClientPluginHost
  • 0x101ca:$x2: IClientNetworkHost
  • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xff05:$x1: NanoCore Client.exe
  • 0x1018d:$x2: NanoCore.ClientPluginHost
  • 0x117c6:$s1: PluginCommand
  • 0x117ba:$s2: FileCommand
  • 0x1266b:$s3: PipeExists
  • 0x18422:$s4: PipeCreated
  • 0x101b7:$s5: IClientLoggingHost
00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfef5:$a: NanoCore
    • 0xff05:$a: NanoCore
    • 0x10139:$a: NanoCore
    • 0x1014d:$a: NanoCore
    • 0x1018d:$a: NanoCore
    • 0xff54:$b: ClientPlugin
    • 0x10156:$b: ClientPlugin
    • 0x10196:$b: ClientPlugin
    • 0x1007b:$c: ProjectData
    • 0x10a82:$d: DESCrypto
    • 0x1844e:$e: KeepAlive
    • 0x1643c:$g: LogClientMessage
    • 0x12637:$i: get_Connected
    • 0x10db8:$j: #=q
    • 0x10de8:$j: #=q
    • 0x10e04:$j: #=q
    • 0x10e34:$j: #=q
    • 0x10e50:$j: #=q
    • 0x10e6c:$j: #=q
    • 0x10e9c:$j: #=q
    • 0x10eb8:$j: #=q
    Process Memory Space: Orderpdf.exe PID: 1268Nanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x70948:$x1: NanoCore.ClientPluginHost
    • 0x70985:$x2: IClientNetworkHost
    • 0x74476:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x7f4e4:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    Click to see the 2 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    0.2.Orderpdf.exe.2120000.1.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0.2.Orderpdf.exe.2120000.1.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xff05:$x1: NanoCore Client.exe
    • 0x1018d:$x2: NanoCore.ClientPluginHost
    • 0x117c6:$s1: PluginCommand
    • 0x117ba:$s2: FileCommand
    • 0x1266b:$s3: PipeExists
    • 0x18422:$s4: PipeCreated
    • 0x101b7:$s5: IClientLoggingHost
    0.2.Orderpdf.exe.2120000.1.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0.2.Orderpdf.exe.2120000.1.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x1007b:$c: ProjectData
      • 0x10a82:$d: DESCrypto
      • 0x1844e:$e: KeepAlive
      • 0x1643c:$g: LogClientMessage
      • 0x12637:$i: get_Connected
      • 0x10db8:$j: #=q
      • 0x10de8:$j: #=q
      • 0x10e04:$j: #=q
      • 0x10e34:$j: #=q
      • 0x10e50:$j: #=q
      • 0x10e6c:$j: #=q
      • 0x10e9c:$j: #=q
      • 0x10eb8:$j: #=q
      0.2.Orderpdf.exe.2120000.1.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe38d:$x1: NanoCore.ClientPluginHost
      • 0xe3ca:$x2: IClientNetworkHost
      • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 3 entries

      Sigma Overview

      AV Detection:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 5876, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 5876, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Stealing of Sensitive Information:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 5876, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 5876, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 0.2.Orderpdf.exe.2120000.1.raw.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "8a1be7ed-1b25-4346-8844-80b424a6", "Group": "Default", "Domain1": "sobe123.ddns.net", "Domain2": "127.0.0.1", "Port": 5656, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5024, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
      Multi AV Scanner detection for submitted fileShow sources
      Source: Orderpdf.exeVirustotal: Detection: 27%Perma Link
      Source: Orderpdf.exeReversingLabs: Detection: 21%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 0.2.Orderpdf.exe.2120000.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Orderpdf.exe.2120000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Orderpdf.exe PID: 1268, type: MEMORYSTR
      Machine Learning detection for sampleShow sources
      Source: Orderpdf.exeJoe Sandbox ML: detected
      Source: Orderpdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: Binary string: wntdll.pdbUGP source: Orderpdf.exe, 00000000.00000003.202490567.0000000002470000.00000004.00000001.sdmp
      Source: Binary string: wntdll.pdb source: Orderpdf.exe, 00000000.00000003.202490567.0000000002470000.00000004.00000001.sdmp
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_0042E672 FindFirstFileExW,

      Networking:

      barindex
      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49706 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49714 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49720 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49726 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49729 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49731 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49732 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49733 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49742 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49743 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49744 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49745 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49746 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49749 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49753 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49755 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49756 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49757 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49758 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49759 -> 185.244.30.22:5656
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: sobe123.ddns.net
      Source: Malware configuration extractorURLs: 127.0.0.1
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: sobe123.ddns.net
      Source: global trafficTCP traffic: 192.168.2.3:49706 -> 185.244.30.22:5656
      Source: Joe Sandbox ViewIP Address: 185.244.30.22 185.244.30.22
      Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.71
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.71
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.71
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.71
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.71
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.71
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.71
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.71
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.71
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.71
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.71
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.71
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.71
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.71
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.71
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.71
      Source: unknownDNS traffic detected: queries for: sobe123.ddns.net
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49686
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49685
      Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
      Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 0.2.Orderpdf.exe.2120000.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Orderpdf.exe.2120000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Orderpdf.exe PID: 1268, type: MEMORYSTR

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 0.2.Orderpdf.exe.2120000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.Orderpdf.exe.2120000.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.Orderpdf.exe.2120000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.Orderpdf.exe.2120000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: Orderpdf.exe PID: 1268, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: Orderpdf.exe PID: 1268, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Initial sample is a PE file and has a suspicious nameShow sources
      Source: initial sampleStatic PE information: Filename: Orderpdf.exe
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_00477095
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_00430525
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_0042CA20
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_00416A80
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_00426F60
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_0042502A
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_0042D129
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_00425287
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_00419340
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_00433646
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_00433766
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 4_2_02A30708
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: String function: 00421060 appears 33 times
      Source: Orderpdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: Orderpdf.exe, 00000000.00000003.201065384.00000000023F6000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Orderpdf.exe
      Source: Orderpdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
      Source: 0.2.Orderpdf.exe.2120000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.Orderpdf.exe.2120000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.Orderpdf.exe.2120000.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.Orderpdf.exe.2120000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.Orderpdf.exe.2120000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.Orderpdf.exe.2120000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: Orderpdf.exe PID: 1268, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: Orderpdf.exe PID: 1268, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: MSBuild.exe, 00000004.00000002.214099841.0000000002F71000.00000004.00000001.sdmpBinary or memory string: *.sln
      Source: classification engineClassification label: mal100.troj.evad.winEXE@8/6@20/2
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9AJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{8a1be7ed-1b25-4346-8844-80b424a6856e}
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6076:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1636:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Users\user\AppData\Local\Temp\tmp86BE.tmpJump to behavior
      Source: C:\Users\user\Desktop\Orderpdf.exeCommand line argument: .KC
      Source: Orderpdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\Desktop\Orderpdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: Orderpdf.exeVirustotal: Detection: 27%
      Source: Orderpdf.exeReversingLabs: Detection: 21%
      Source: C:\Users\user\Desktop\Orderpdf.exeFile read: C:\Users\user\Desktop\Orderpdf.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\Orderpdf.exe 'C:\Users\user\Desktop\Orderpdf.exe'
      Source: C:\Users\user\Desktop\Orderpdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 'C:\Users\user\Desktop\Orderpdf.exe'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp86BE.tmp'
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\Orderpdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 'C:\Users\user\Desktop\Orderpdf.exe'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp86BE.tmp'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: Orderpdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: wntdll.pdbUGP source: Orderpdf.exe, 00000000.00000003.202490567.0000000002470000.00000004.00000001.sdmp
      Source: Binary string: wntdll.pdb source: Orderpdf.exe, 00000000.00000003.202490567.0000000002470000.00000004.00000001.sdmp
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_004210A6 push ecx; ret

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp86BE.tmp'

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe:Zone.Identifier read attributes | delete
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: threadDelayed 405
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: foregroundWindowGot 1041
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: foregroundWindowGot 354
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 5928Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 5984Thread sleep time: -460000s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 5608Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_0042E672 FindFirstFileExW,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_0042B27F IsDebuggerPresent,OutputDebugStringW,
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_00477095 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_0042E361 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_0042E3D6 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_0042E3A5 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_00427A76 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_00420F38 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_004212D2 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_00425E37 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Maps a DLL or memory area into another processShow sources
      Source: C:\Users\user\Desktop\Orderpdf.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe protection: execute and read and write
      Source: C:\Users\user\Desktop\Orderpdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 'C:\Users\user\Desktop\Orderpdf.exe'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp86BE.tmp'
      Source: MSBuild.exe, 00000001.00000003.434382108.00000000013BC000.00000004.00000001.sdmpBinary or memory string: Program Managersoft.NET\Framework\v2.0.50727\MSBuild.exe
      Source: MSBuild.exe, 00000001.00000003.308640440.00000000013BC000.00000004.00000001.sdmpBinary or memory string: Program Managersoft.NET\Framework\v2.0.50727\MSBuild.exet
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_00421128 cpuid
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Users\user\Desktop\Orderpdf.exeCode function: 0_2_004214BC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 0.2.Orderpdf.exe.2120000.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Orderpdf.exe.2120000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Orderpdf.exe PID: 1268, type: MEMORYSTR

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: Orderpdf.exe, 00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 0.2.Orderpdf.exe.2120000.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Orderpdf.exe.2120000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Orderpdf.exe PID: 1268, type: MEMORYSTR

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsCommand and Scripting Interpreter2Scheduled Task/Job1Process Injection112Masquerading1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemorySecurity Software Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSVirtualization/Sandbox Evasion21Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol22Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncSystem Information Discovery23Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      Orderpdf.exe28%VirustotalBrowse
      Orderpdf.exe22%ReversingLabsWin32.Trojan.NanoBot
      Orderpdf.exe100%Joe Sandbox ML

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      127.0.0.10%VirustotalBrowse
      127.0.0.10%Avira URL Cloudsafe
      sobe123.ddns.net0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      sobe123.ddns.net
      185.244.30.22
      truetrue
        unknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        127.0.0.1true
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        sobe123.ddns.nettrue
        • Avira URL Cloud: safe
        unknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        185.244.30.22
        sobe123.ddns.netNetherlands
        209623DAVID_CRAIGGGtrue

        Private

        IP
        192.168.2.1

        General Information

        Joe Sandbox Version:33.0.0 White Diamond
        Analysis ID:458217
        Start date:03.08.2021
        Start time:03:31:10
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 6m 16s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:Orderpdf.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:33
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@8/6@20/2
        EGA Information:Failed
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 67%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
        • TCP Packets have been reduced to 100
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
        • Excluded IPs from analysis (whitelisted): 52.255.188.83, 52.147.198.201, 104.42.151.234, 20.50.102.62, 23.211.4.86, 80.67.82.211, 80.67.82.235, 40.112.88.60, 23.211.6.115
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus16.cloudapp.net
        • Not all processes where analyzed, report is missing behavior information

        Simulations

        Behavior and APIs

        TimeTypeDescription
        03:32:00API Interceptor1064x Sleep call for process: MSBuild.exe modified
        03:32:02Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe" s>$(Arg0)

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        185.244.30.22Permintaan Baru 0010.exeGet hashmaliciousBrowse
          Shipping document PL and BL0070,pdf.exeGet hashmaliciousBrowse
            Shipping document PL and BL0070,pdf.exeGet hashmaliciousBrowse
              Shipping document PL and BL0070,pdf.exeGet hashmaliciousBrowse
                AWB 686553534 L#U00f4 h#U00e0ng ,pdf.exeGet hashmaliciousBrowse

                  Domains

                  No context

                  ASN

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  DAVID_CRAIGGGd1IaoX0mpm.exeGet hashmaliciousBrowse
                  • 185.140.53.6
                  ORDER LIST.xlsxGet hashmaliciousBrowse
                  • 185.140.53.6
                  8146Q5rN9g.exeGet hashmaliciousBrowse
                  • 91.193.75.162
                  Scanned Documents 001.docGet hashmaliciousBrowse
                  • 91.193.75.162
                  Quotation Request August RFQ8012021.exeGet hashmaliciousBrowse
                  • 185.140.53.253
                  NEW PO pdf.exeGet hashmaliciousBrowse
                  • 91.193.75.162
                  Permintaan Baru 0010.exeGet hashmaliciousBrowse
                  • 185.244.30.22
                  5yvgVnT8wz.exeGet hashmaliciousBrowse
                  • 185.244.30.23
                  LxYbtlP5nB.exeGet hashmaliciousBrowse
                  • 185.244.30.23
                  eInFMnZWWV.exeGet hashmaliciousBrowse
                  • 185.244.30.143
                  Purchase order FOD-0056-2021-D.exeGet hashmaliciousBrowse
                  • 91.193.75.162
                  ARRIVAL NOTICE FOR NEW ORDER190009.exeGet hashmaliciousBrowse
                  • 185.140.53.142
                  Quotation RequestQR28072021.exeGet hashmaliciousBrowse
                  • 185.140.53.253
                  Spare Parts Requisition-003,004.exeGet hashmaliciousBrowse
                  • 185.244.30.238
                  Order List.exeGet hashmaliciousBrowse
                  • 91.193.75.228
                  Quote 992002892.docGet hashmaliciousBrowse
                  • 185.244.30.238
                  4FNiWwUTLR.exeGet hashmaliciousBrowse
                  • 185.244.30.238
                  PMA21-110.exeGet hashmaliciousBrowse
                  • 91.193.75.228
                  PEDIDO DE COMPRA ASHCROFT - 41901E-001,pdf.exeGet hashmaliciousBrowse
                  • 185.140.53.11
                  Quotation.exeGet hashmaliciousBrowse
                  • 185.244.30.53

                  JA3 Fingerprints

                  No context

                  Dropped Files

                  No context

                  Created / dropped Files

                  C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\MSBuild.exe.log
                  Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):325
                  Entropy (8bit):5.334380084018418
                  Encrypted:false
                  SSDEEP:6:Q3LadLCR22IAQykdL1tZbLsbFLIP12MUAvvro6ysGMFLIP12MUAvvrs:Q3LaJU20NaL1tZbgbe4MqJsGMe4M6
                  MD5:65CE98936A67552310EFE2F0FF5BDF88
                  SHA1:8133653A6B9A169C7496ADE315CED322CFC3613A
                  SHA-256:682F7C55B1B6E189D17755F74959CD08762F91373203B3B982ACFFCADE2E871A
                  SHA-512:2D00AC024267EC384720A400F6D0B4F7EDDF49FAF8AB3C9E6CBFBBAE90ECADACA9022B33E3E8EC92E4F57C7FC830299C8643235EB4AA7D8A6AFE9DD1775F57C3
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..2,"Microsoft.Build.Engine, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build.Framework, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                  C:\Users\user\AppData\Local\Temp\tmp86BE.tmp
                  Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1320
                  Entropy (8bit):5.136963558289723
                  Encrypted:false
                  SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mnc2xtn:cbk4oL600QydbQxIYODOLedq3ZLj
                  MD5:AE766004C0D8792953BAFFFE8F6A2E3B
                  SHA1:14B12F27543A401E2FE0AF8052E116CAB0032426
                  SHA-256:1ABDD9B6A6B84E4BA1AF1282DC84CE276C59BA253F4C4AF05FEA498A4FD99540
                  SHA-512:E530DA4A5D4336FC37838D0E93B5EB3804B9C489C71F6954A47FC81A4C655BB72EC493E109CF96E6E3617D7623AC80697AD3BBD5FFC6281BAFC8B34DCA5E6567
                  Malicious:true
                  Reputation:moderate, very likely benign file
                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                  Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):2320
                  Entropy (8bit):7.089541637477408
                  Encrypted:false
                  SSDEEP:48:IknjhUknjhUknjhUknjhUknjhUknjhUknjhUknjhUknjhUknjhL:HjhDjhDjhDjhDjhDjhDjhDjhDjhDjhL
                  MD5:2CC2E05CB39A76B255530F61BA4AA2E3
                  SHA1:76BD6001B1922B2B3FB2F618740FA74A6C532A7F
                  SHA-256:FBF89196FF1A9FC33EE6C42DC0A959DAA89E2322F3417C77534C9968C0885271
                  SHA-512:2EACD3A81456781803A9C14F7471DBBDB126BBE7AEC3105B1A49AB115A8BB831EA0D1DF48BAB00EB8231B114EAE5A03DF73A7A60B45BA03CB2F92382CF4DBB38
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                  Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8
                  Entropy (8bit):3.0
                  Encrypted:false
                  SSDEEP:3:6vtn:6vt
                  MD5:604254C4E0DED10AC094C2AEFF16A952
                  SHA1:D0CCCC461EE99F9C1D7DE9045FEBE2BB8753597C
                  SHA-256:9C14AE70F96EB4C5BCCADA9E26DE13EB95ED53E08D10F2283F51049A3381E5E9
                  SHA-512:14229C84CA48525291DE039DC041A053ABAEBCFA17E7A351A36CC8BF06971A2A4CBC77DB5E4B019918961F2790AD4C63946A26A5240066924C06539C9CAD6394
                  Malicious:true
                  Reputation:low
                  Preview: ....iV.H
                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                  Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):57
                  Entropy (8bit):4.85263908467479
                  Encrypted:false
                  SSDEEP:3:oMty8WbSI1u:oMLWuI1u
                  MD5:A35128E4E28B27328F70E4E8FF482443
                  SHA1:B89066B2F8DB34299AABFD7ABEE402D5444DD079
                  SHA-256:88AEA00733DC4B570A29D56A423CC5BF163E5ACE7AF349972EB0BBA8D9AD06E1
                  SHA-512:F098E844B5373B34642B49B6E0F2E15CFDAA1A8B6CABC2196CEC0F3765289E5B1FD4AB588DD65F97C8E51FA9A81077621E9A06946859F296904C646906A70F33
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                  \Device\ConDrv
                  Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):235
                  Entropy (8bit):5.107306146099542
                  Encrypted:false
                  SSDEEP:6:zx3M1tlAX8bSWR30qysGMQbSVRRZBXVRbJ0fFPRAgRYan:zK1XnV30ZsGMIG9BFRbQ5AUYan
                  MD5:67DDD8252A246E7B14649B0063E351C0
                  SHA1:AAE1C6839D1CC4A626D0FB2D4773823AD209FA17
                  SHA-256:24C8283BA3F7FCA2E4CEF6F141263DD1E8A36E5A5CD96A97BFE83525D7663116
                  SHA-512:326A5E0A440F60D4808C91499F1F3616C496B67DC053B4A2A40B0FE09002074AE5365018781F8746E98E7E3CFCD35F1310D17FB7C2138A8157318E6791987025
                  Malicious:false
                  Preview: Microsoft (R) Build Engine Version 2.0.50727.8922..[Microsoft .NET Framework, Version 2.0.50727.8922]..Copyright (C) Microsoft Corporation 2005. All rights reserved.....MSBUILD : error MSB1009: Project file does not exist...Switch: 0..

                  Static File Info

                  General

                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.186849273906373
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:Orderpdf.exe
                  File size:869938
                  MD5:2849c98c8d071260b2618beacf873a98
                  SHA1:2431f573d98aaaaa1752b73c4a5f53e8b4660e50
                  SHA256:959536bfd1cf19758dde804eaf7e1d38585b573ccf4dc327898979f29cac33a8
                  SHA512:0e84db59a75e6010953f247e74716996f7c652d7b9a541dd3407aa5284958c17c7cb3750d638240410feaea4804fe5d700fc4303eb0f18a5b96ef1833553efab
                  SSDEEP:12288:f1Wl8T5UM63xjmelf+6QY+IffW3TLueA0b:fA2adx06QYffaLNb
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......;$G..E)].E)].E)]k.*\kE)]k.,\.E)]k.-\eE)]D.*\kE)]D.,\DE)]D.-\]E)]k.(\vE)].E(].E)]..,\vE)]...]~E)].E.]~E)]..+\~E)]Rich.E)].......

                  File Icon

                  Icon Hash:00ecf0f0e8ecf400

                  Static PE Info

                  General

                  Entrypoint:0x420e4a
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                  DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
                  Time Stamp:0x61087E6E [Mon Aug 2 23:23:26 2021 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:6
                  OS Version Minor:0
                  File Version Major:6
                  File Version Minor:0
                  Subsystem Version Major:6
                  Subsystem Version Minor:0
                  Import Hash:49be0836dac021f86af2cb207b4613c8

                  Entrypoint Preview

                  Instruction
                  call 00007F1ED0C53BF2h
                  jmp 00007F1ED0C53413h
                  jmp dword ptr [0043617Ch]
                  push eax
                  push dword ptr fs:[00000000h]
                  lea eax, dword ptr [esp+0Ch]
                  sub esp, dword ptr [esp+0Ch]
                  push ebx
                  push esi
                  push edi
                  mov dword ptr [eax], ebp
                  mov ebp, eax
                  mov eax, dword ptr [00477304h]
                  xor eax, ebp
                  push eax
                  mov dword ptr [ebp-10h], esp
                  push dword ptr [ebp-04h]
                  mov dword ptr [ebp-04h], FFFFFFFFh
                  lea eax, dword ptr [ebp-0Ch]
                  mov dword ptr fs:[00000000h], eax
                  ret
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  push ecx
                  lea ecx, dword ptr [esp+08h]
                  sub ecx, eax
                  and ecx, 0Fh
                  add eax, ecx
                  sbb ecx, ecx
                  or eax, ecx
                  pop ecx
                  jmp 00007F1ED0C52DCFh
                  push ecx
                  lea ecx, dword ptr [esp+08h]
                  sub ecx, eax
                  and ecx, 07h
                  add eax, ecx
                  sbb ecx, ecx
                  or eax, ecx
                  pop ecx
                  jmp 00007F1ED0C52DB9h
                  int3
                  int3
                  int3
                  int3
                  push ebx
                  push esi
                  mov eax, dword ptr [esp+18h]
                  or eax, eax
                  jne 00007F1ED0C5359Ah
                  mov ecx, dword ptr [esp+14h]
                  mov eax, dword ptr [esp+10h]
                  xor edx, edx
                  div ecx
                  mov ebx, eax
                  mov eax, dword ptr [esp+0Ch]
                  div ecx
                  mov edx, ebx
                  jmp 00007F1ED0C535C3h
                  mov ecx, eax
                  mov ebx, dword ptr [esp+14h]
                  mov edx, dword ptr [esp+10h]
                  mov eax, dword ptr [esp+0Ch]
                  shr ecx, 1
                  rcr ebx, 1
                  shr edx, 1
                  rcr eax, 1
                  or ecx, ecx
                  jne 00007F1ED0C53576h
                  div ebx
                  mov esi, eax
                  mul dword ptr [eax+eax+00h]

                  Rich Headers

                  Programming Language:
                  • [C++] VS2015 UPD3.1 build 24215
                  • [LNK] VS2015 UPD3.1 build 24215
                  • [RES] VS2015 UPD3 build 24213

                  Data Directories

                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x7602c0x64.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x7b0000x294e0.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x749500x38.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x749e40x18.rdata
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x749880x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x360000x17c.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                  Sections

                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x349120x34a00False0.446050141033data6.54583953865IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .rdata0x360000x408b60x40a00False0.257729388298data4.10647165512IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x770000x1e080x1000False0.296630859375DOS executable (COM)3.39752271911IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  .gfids0x790000x1500x200False0.33203125data1.72024643613IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .tls0x7a0000x90x200False0.033203125data0.0203931352361IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  .rsrc0x7b0000x294e00x29600False0.0884688916163data3.29281992913IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                  Resources

                  NameRVASizeTypeLanguageCountry
                  RT_ICON0x7b2700x18a7PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                  RT_ICON0x7cb180x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                  RT_ICON0x8d3400x94a8dataEnglishUnited States
                  RT_ICON0x967e80x5488dataEnglishUnited States
                  RT_ICON0x9bc700x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295EnglishUnited States
                  RT_ICON0x9fe980x25a8dataEnglishUnited States
                  RT_ICON0xa24400x10a8dataEnglishUnited States
                  RT_ICON0xa34e80x988dataEnglishUnited States
                  RT_ICON0xa3e700x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                  RT_GROUP_ICON0xa42d80x84dataEnglishUnited States
                  RT_MANIFEST0xa43600x17dXML 1.0 document textEnglishUnited States

                  Imports

                  DLLImport
                  KERNEL32.dllOutputDebugStringW, FormatMessageW, VirtualProtect, HeapSize, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, SetFilePointerEx, GetFileSizeEx, SetStdHandle, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, FindClose, GetProcessHeap, WriteFile, ExitProcess, HeapReAlloc, HeapFree, HeapAlloc, WriteConsoleW, GetModuleHandleExW, GetModuleFileNameW, GetFileType, GetStdHandle, LoadLibraryExW, WideCharToMultiByte, MultiByteToWideChar, GetStringTypeW, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, EncodePointer, DecodePointer, SetLastError, InitializeCriticalSectionAndSpinCount, CreateEventW, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetSystemTimeAsFileTime, GetModuleHandleW, GetProcAddress, LCMapStringW, GetCPInfo, CloseHandle, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, InitializeSListHead, RaiseException, RtlUnwind, GetLastError, FreeLibrary, CreateFileW
                  USER32.dllGrayStringA, GetDC, TranslateMessage, DispatchMessageW, PeekMessageW, DefWindowProcW, PostQuitMessage, UnregisterClassW, RegisterClassExW, CreateWindowExW, ShowWindow, SetCapture, ReleaseCapture, LoadImageW, LoadCursorW, SetWindowLongW, GetWindowLongW, AdjustWindowRect, UpdateWindow
                  d3d11.dllD3D11CreateDeviceAndSwapChain
                  gdiplus.dllGdiplusStartup, GdiplusShutdown

                  Possible Origin

                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States

                  Network Behavior

                  Snort IDS Alerts

                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  08/03/21-03:32:01.658714TCP2025019ET TROJAN Possible NanoCore C2 60B497065656192.168.2.3185.244.30.22
                  08/03/21-03:32:07.884442TCP2025019ET TROJAN Possible NanoCore C2 60B497145656192.168.2.3185.244.30.22
                  08/03/21-03:32:13.096068TCP2025019ET TROJAN Possible NanoCore C2 60B497205656192.168.2.3185.244.30.22
                  08/03/21-03:32:20.053138TCP2025019ET TROJAN Possible NanoCore C2 60B497265656192.168.2.3185.244.30.22
                  08/03/21-03:32:26.158381TCP2025019ET TROJAN Possible NanoCore C2 60B497295656192.168.2.3185.244.30.22
                  08/03/21-03:32:35.527911TCP2025019ET TROJAN Possible NanoCore C2 60B497315656192.168.2.3185.244.30.22
                  08/03/21-03:32:41.635368TCP2025019ET TROJAN Possible NanoCore C2 60B497325656192.168.2.3185.244.30.22
                  08/03/21-03:32:48.089965TCP2025019ET TROJAN Possible NanoCore C2 60B497335656192.168.2.3185.244.30.22
                  08/03/21-03:32:56.068267TCP2025019ET TROJAN Possible NanoCore C2 60B497425656192.168.2.3185.244.30.22
                  08/03/21-03:33:02.446681TCP2025019ET TROJAN Possible NanoCore C2 60B497435656192.168.2.3185.244.30.22
                  08/03/21-03:33:08.692026TCP2025019ET TROJAN Possible NanoCore C2 60B497445656192.168.2.3185.244.30.22
                  08/03/21-03:33:14.889582TCP2025019ET TROJAN Possible NanoCore C2 60B497455656192.168.2.3185.244.30.22
                  08/03/21-03:33:21.077319TCP2025019ET TROJAN Possible NanoCore C2 60B497465656192.168.2.3185.244.30.22
                  08/03/21-03:33:27.201337TCP2025019ET TROJAN Possible NanoCore C2 60B497495656192.168.2.3185.244.30.22
                  08/03/21-03:33:33.527958TCP2025019ET TROJAN Possible NanoCore C2 60B497535656192.168.2.3185.244.30.22
                  08/03/21-03:33:40.158463TCP2025019ET TROJAN Possible NanoCore C2 60B497555656192.168.2.3185.244.30.22
                  08/03/21-03:33:46.612650TCP2025019ET TROJAN Possible NanoCore C2 60B497565656192.168.2.3185.244.30.22
                  08/03/21-03:33:52.859023TCP2025019ET TROJAN Possible NanoCore C2 60B497575656192.168.2.3185.244.30.22
                  08/03/21-03:33:58.969834TCP2025019ET TROJAN Possible NanoCore C2 60B497585656192.168.2.3185.244.30.22
                  08/03/21-03:34:04.972456TCP2025019ET TROJAN Possible NanoCore C2 60B497595656192.168.2.3185.244.30.22

                  Network Port Distribution

                  TCP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Aug 3, 2021 03:31:50.874691963 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.874774933 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.885886908 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.885925055 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.885943890 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.886004925 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.886028051 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.886061907 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.886090040 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.886113882 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.886183977 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.886212111 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.886234045 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.886255980 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.886271000 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.886349916 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.886447906 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.897280931 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897326946 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897356033 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897380114 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897404909 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897403955 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.897429943 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897454023 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897476912 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.897479057 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897502899 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897507906 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.897562981 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.897584915 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.897603035 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897629023 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897701979 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897726059 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897751093 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897773981 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897841930 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.897852898 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897878885 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.897885084 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.897898912 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.897911072 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.897948027 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.898009062 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.898014069 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.898037910 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.898072004 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.898145914 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.898173094 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.898211956 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.910824060 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.910860062 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.910883904 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.910901070 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.910926104 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.910949945 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.910974979 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.910998106 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911031961 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911061049 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911083937 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911108017 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911204100 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911231995 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911259890 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911284924 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911309004 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911343098 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911372900 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911396980 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911422014 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911447048 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911480904 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.911484003 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911509037 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911534071 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911566973 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911567926 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:50.911597013 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911621094 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911645889 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911672115 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911694050 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911719084 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911744118 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911777973 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911806107 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911828995 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.911854982 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.966413021 CEST44349696204.79.197.200192.168.2.3
                  Aug 3, 2021 03:31:50.966567993 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:55.852992058 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:55.853085995 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:55.853144884 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:55.853187084 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:55.853225946 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:55.853252888 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:55.853267908 CEST49696443192.168.2.3204.79.197.200
                  Aug 3, 2021 03:31:55.853293896 CEST49696443192.168.2.3204.79.197.200

                  UDP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Aug 3, 2021 03:31:49.568717957 CEST5754453192.168.2.38.8.8.8
                  Aug 3, 2021 03:31:49.604372978 CEST53575448.8.8.8192.168.2.3
                  Aug 3, 2021 03:31:50.238764048 CEST5598453192.168.2.38.8.8.8
                  Aug 3, 2021 03:31:50.264038086 CEST53559848.8.8.8192.168.2.3
                  Aug 3, 2021 03:31:59.450725079 CEST6418553192.168.2.38.8.8.8
                  Aug 3, 2021 03:31:59.484168053 CEST53641858.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:01.459546089 CEST6511053192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:01.494106054 CEST53651108.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:01.928421021 CEST5836153192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:01.953347921 CEST53583618.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:02.915808916 CEST6349253192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:02.949610949 CEST53634928.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:04.053642035 CEST6083153192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:04.078742981 CEST53608318.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:04.755917072 CEST6010053192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:04.780930042 CEST53601008.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:05.873358965 CEST5319553192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:05.899503946 CEST53531958.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:06.560197115 CEST5014153192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:06.595525980 CEST53501418.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:07.284277916 CEST5302353192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:07.311912060 CEST53530238.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:07.727443933 CEST4956353192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:07.762829065 CEST53495638.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:07.975522041 CEST5135253192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:08.012305975 CEST53513528.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:08.970345974 CEST5934953192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:08.999629021 CEST53593498.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:10.023586035 CEST5708453192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:10.048660040 CEST53570848.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:10.744406939 CEST5882353192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:10.771956921 CEST53588238.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:11.706285000 CEST5756853192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:11.734200954 CEST53575688.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:12.893038988 CEST5054053192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:12.928888083 CEST53505408.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:13.963527918 CEST5436653192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:13.995934963 CEST53543668.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:15.629363060 CEST5303453192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:15.653919935 CEST53530348.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:17.219129086 CEST5776253192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:17.254772902 CEST53577628.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:19.907943010 CEST5543553192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:19.943284988 CEST53554358.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:26.012536049 CEST5071353192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:26.048392057 CEST53507138.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:27.197000980 CEST5613253192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:27.233195066 CEST53561328.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:32.371571064 CEST5898753192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:32.403898954 CEST53589878.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:41.492619038 CEST5657953192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:41.526473045 CEST53565798.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:47.952207088 CEST6063353192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:47.976875067 CEST53606338.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:51.863406897 CEST6129253192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:51.905147076 CEST53612928.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:53.899343967 CEST6361953192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:53.936256886 CEST53636198.8.8.8192.168.2.3
                  Aug 3, 2021 03:32:55.367870092 CEST6493853192.168.2.38.8.8.8
                  Aug 3, 2021 03:32:55.394695997 CEST53649388.8.8.8192.168.2.3
                  Aug 3, 2021 03:33:02.150737047 CEST6194653192.168.2.38.8.8.8
                  Aug 3, 2021 03:33:02.184956074 CEST53619468.8.8.8192.168.2.3
                  Aug 3, 2021 03:33:08.559366941 CEST6491053192.168.2.38.8.8.8
                  Aug 3, 2021 03:33:08.584351063 CEST53649108.8.8.8192.168.2.3
                  Aug 3, 2021 03:33:14.747713089 CEST5212353192.168.2.38.8.8.8
                  Aug 3, 2021 03:33:14.780982971 CEST53521238.8.8.8192.168.2.3
                  Aug 3, 2021 03:33:20.908586025 CEST5613053192.168.2.38.8.8.8
                  Aug 3, 2021 03:33:20.944596052 CEST53561308.8.8.8192.168.2.3
                  Aug 3, 2021 03:33:26.054903030 CEST5633853192.168.2.38.8.8.8
                  Aug 3, 2021 03:33:26.088956118 CEST53563388.8.8.8192.168.2.3
                  Aug 3, 2021 03:33:27.059242964 CEST5942053192.168.2.38.8.8.8
                  Aug 3, 2021 03:33:27.093126059 CEST53594208.8.8.8192.168.2.3
                  Aug 3, 2021 03:33:32.376171112 CEST5878453192.168.2.38.8.8.8
                  Aug 3, 2021 03:33:32.417201996 CEST53587848.8.8.8192.168.2.3
                  Aug 3, 2021 03:33:33.107549906 CEST6397853192.168.2.38.8.8.8
                  Aug 3, 2021 03:33:33.143085957 CEST53639788.8.8.8192.168.2.3
                  Aug 3, 2021 03:33:33.388942957 CEST6293853192.168.2.38.8.8.8
                  Aug 3, 2021 03:33:33.421489954 CEST53629388.8.8.8192.168.2.3
                  Aug 3, 2021 03:33:39.841692924 CEST5570853192.168.2.38.8.8.8
                  Aug 3, 2021 03:33:39.878473043 CEST53557088.8.8.8192.168.2.3
                  Aug 3, 2021 03:33:46.470058918 CEST5680353192.168.2.38.8.8.8
                  Aug 3, 2021 03:33:46.502367020 CEST53568038.8.8.8192.168.2.3
                  Aug 3, 2021 03:33:52.714616060 CEST5714553192.168.2.38.8.8.8
                  Aug 3, 2021 03:33:52.748580933 CEST53571458.8.8.8192.168.2.3
                  Aug 3, 2021 03:33:58.801398039 CEST5535953192.168.2.38.8.8.8
                  Aug 3, 2021 03:33:58.836028099 CEST53553598.8.8.8192.168.2.3
                  Aug 3, 2021 03:34:04.816489935 CEST5830653192.168.2.38.8.8.8
                  Aug 3, 2021 03:34:04.851423025 CEST53583068.8.8.8192.168.2.3

                  DNS Queries

                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  Aug 3, 2021 03:32:01.459546089 CEST192.168.2.38.8.8.80xae9cStandard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:32:07.727443933 CEST192.168.2.38.8.8.80x275aStandard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:32:12.893038988 CEST192.168.2.38.8.8.80x328cStandard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:32:19.907943010 CEST192.168.2.38.8.8.80x17e8Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:32:26.012536049 CEST192.168.2.38.8.8.80xd834Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:32:32.371571064 CEST192.168.2.38.8.8.80xa93aStandard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:32:41.492619038 CEST192.168.2.38.8.8.80x37d6Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:32:47.952207088 CEST192.168.2.38.8.8.80x6a52Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:32:55.367870092 CEST192.168.2.38.8.8.80x3950Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:02.150737047 CEST192.168.2.38.8.8.80xae82Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:08.559366941 CEST192.168.2.38.8.8.80x8027Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:14.747713089 CEST192.168.2.38.8.8.80xae74Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:20.908586025 CEST192.168.2.38.8.8.80x8775Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:27.059242964 CEST192.168.2.38.8.8.80x79c9Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:33.388942957 CEST192.168.2.38.8.8.80x39f4Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:39.841692924 CEST192.168.2.38.8.8.80xdd75Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:46.470058918 CEST192.168.2.38.8.8.80xf814Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:52.714616060 CEST192.168.2.38.8.8.80xb9c8Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:58.801398039 CEST192.168.2.38.8.8.80xa220Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                  Aug 3, 2021 03:34:04.816489935 CEST192.168.2.38.8.8.80xfaa0Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)

                  DNS Answers

                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  Aug 3, 2021 03:32:01.494106054 CEST8.8.8.8192.168.2.30xae9cNo error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:32:07.762829065 CEST8.8.8.8192.168.2.30x275aNo error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:32:12.928888083 CEST8.8.8.8192.168.2.30x328cNo error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:32:19.943284988 CEST8.8.8.8192.168.2.30x17e8No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:32:26.048392057 CEST8.8.8.8192.168.2.30xd834No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:32:32.403898954 CEST8.8.8.8192.168.2.30xa93aNo error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:32:41.526473045 CEST8.8.8.8192.168.2.30x37d6No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:32:47.976875067 CEST8.8.8.8192.168.2.30x6a52No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:32:55.394695997 CEST8.8.8.8192.168.2.30x3950No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:02.184956074 CEST8.8.8.8192.168.2.30xae82No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:08.584351063 CEST8.8.8.8192.168.2.30x8027No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:14.780982971 CEST8.8.8.8192.168.2.30xae74No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:20.944596052 CEST8.8.8.8192.168.2.30x8775No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:27.093126059 CEST8.8.8.8192.168.2.30x79c9No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:33.421489954 CEST8.8.8.8192.168.2.30x39f4No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:39.878473043 CEST8.8.8.8192.168.2.30xdd75No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:46.502367020 CEST8.8.8.8192.168.2.30xf814No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:52.748580933 CEST8.8.8.8192.168.2.30xb9c8No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:33:58.836028099 CEST8.8.8.8192.168.2.30xa220No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                  Aug 3, 2021 03:34:04.851423025 CEST8.8.8.8192.168.2.30xfaa0No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)

                  Code Manipulations

                  Statistics

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:03:31:57
                  Start date:03/08/2021
                  Path:C:\Users\user\Desktop\Orderpdf.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Users\user\Desktop\Orderpdf.exe'
                  Imagebase:0x400000
                  File size:869938 bytes
                  MD5 hash:2849C98C8D071260B2618BEACF873A98
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmp, Author: Florian Roth
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.205053043.0000000002120000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  Reputation:low

                  General

                  Start time:03:31:57
                  Start date:03/08/2021
                  Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Users\user\Desktop\Orderpdf.exe'
                  Imagebase:0xd90000
                  File size:69632 bytes
                  MD5 hash:88BBB7610152B48C2B3879473B17857E
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Reputation:moderate

                  General

                  Start time:03:31:59
                  Start date:03/08/2021
                  Path:C:\Windows\SysWOW64\schtasks.exe
                  Wow64 process (32bit):true
                  Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp86BE.tmp'
                  Imagebase:0x1240000
                  File size:185856 bytes
                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:03:32:00
                  Start date:03/08/2021
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff6b2800000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:03:32:02
                  Start date:03/08/2021
                  Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0
                  Imagebase:0x6d0000
                  File size:69632 bytes
                  MD5 hash:88BBB7610152B48C2B3879473B17857E
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Reputation:moderate

                  General

                  Start time:03:32:02
                  Start date:03/08/2021
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff6b2800000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Disassembly

                  Code Analysis

                  Reset < >