Loading ...

Play interactive tourEdit tour

Windows Analysis Report Orderlist.exe

Overview

General Information

Sample Name:Orderlist.exe
Analysis ID:458451
MD5:57201aec028c2bd9a91e79ed81aeb868
SHA1:150471c9ac6f4324bbcd1a3852d1755fed87440a
SHA256:580eb6d5dffc61f35b4fe0ea5c0ab113af6f39e971282f9fff016b7f54d036ab
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Nanocore RAT
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • Orderlist.exe (PID: 5836 cmdline: 'C:\Users\user\Desktop\Orderlist.exe' MD5: 57201AEC028C2BD9A91E79ED81AEB868)
    • MSBuild.exe (PID: 5796 cmdline: 'C:\Users\user\Desktop\Orderlist.exe' MD5: 88BBB7610152B48C2B3879473B17857E)
      • schtasks.exe (PID: 1628 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD5BB.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 1324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • MSBuild.exe (PID: 4204 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0 MD5: 88BBB7610152B48C2B3879473B17857E)
    • conhost.exe (PID: 1188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "8a1be7ed-1b25-4346-8844-80b424a6", "Group": "Default", "Domain1": "sobe123.ddns.net", "Domain2": "127.0.0.1", "Port": 5656, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5024, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1018d:$x1: NanoCore.ClientPluginHost
  • 0x101ca:$x2: IClientNetworkHost
  • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xff05:$x1: NanoCore Client.exe
  • 0x1018d:$x2: NanoCore.ClientPluginHost
  • 0x117c6:$s1: PluginCommand
  • 0x117ba:$s2: FileCommand
  • 0x1266b:$s3: PipeExists
  • 0x18422:$s4: PipeCreated
  • 0x101b7:$s5: IClientLoggingHost
00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfef5:$a: NanoCore
    • 0xff05:$a: NanoCore
    • 0x10139:$a: NanoCore
    • 0x1014d:$a: NanoCore
    • 0x1018d:$a: NanoCore
    • 0xff54:$b: ClientPlugin
    • 0x10156:$b: ClientPlugin
    • 0x10196:$b: ClientPlugin
    • 0x1007b:$c: ProjectData
    • 0x10a82:$d: DESCrypto
    • 0x1844e:$e: KeepAlive
    • 0x1643c:$g: LogClientMessage
    • 0x12637:$i: get_Connected
    • 0x10db8:$j: #=q
    • 0x10de8:$j: #=q
    • 0x10e04:$j: #=q
    • 0x10e34:$j: #=q
    • 0x10e50:$j: #=q
    • 0x10e6c:$j: #=q
    • 0x10e9c:$j: #=q
    • 0x10eb8:$j: #=q
    Process Memory Space: Orderlist.exe PID: 5836Nanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xde3:$x1: NanoCore.ClientPluginHost
    • 0xe20:$x2: IClientNetworkHost
    • 0x4911:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0xf997:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    Click to see the 2 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    1.2.Orderlist.exe.3850000.2.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe38d:$x1: NanoCore.ClientPluginHost
    • 0xe3ca:$x2: IClientNetworkHost
    • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    1.2.Orderlist.exe.3850000.2.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe105:$x1: NanoCore Client.exe
    • 0xe38d:$x2: NanoCore.ClientPluginHost
    • 0xf9c6:$s1: PluginCommand
    • 0xf9ba:$s2: FileCommand
    • 0x1086b:$s3: PipeExists
    • 0x16622:$s4: PipeCreated
    • 0xe3b7:$s5: IClientLoggingHost
    1.2.Orderlist.exe.3850000.2.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      1.2.Orderlist.exe.3850000.2.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xe0f5:$a: NanoCore
      • 0xe105:$a: NanoCore
      • 0xe339:$a: NanoCore
      • 0xe34d:$a: NanoCore
      • 0xe38d:$a: NanoCore
      • 0xe154:$b: ClientPlugin
      • 0xe356:$b: ClientPlugin
      • 0xe396:$b: ClientPlugin
      • 0xe27b:$c: ProjectData
      • 0xec82:$d: DESCrypto
      • 0x1664e:$e: KeepAlive
      • 0x1463c:$g: LogClientMessage
      • 0x10837:$i: get_Connected
      • 0xefb8:$j: #=q
      • 0xefe8:$j: #=q
      • 0xf004:$j: #=q
      • 0xf034:$j: #=q
      • 0xf050:$j: #=q
      • 0xf06c:$j: #=q
      • 0xf09c:$j: #=q
      • 0xf0b8:$j: #=q
      1.2.Orderlist.exe.3850000.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 3 entries

      Sigma Overview

      AV Detection:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 5796, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 5796, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Stealing of Sensitive Information:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 5796, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 5796, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 1.2.Orderlist.exe.3850000.2.raw.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "8a1be7ed-1b25-4346-8844-80b424a6", "Group": "Default", "Domain1": "sobe123.ddns.net", "Domain2": "127.0.0.1", "Port": 5656, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5024, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
      Multi AV Scanner detection for submitted fileShow sources
      Source: Orderlist.exeReversingLabs: Detection: 26%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 1.2.Orderlist.exe.3850000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.Orderlist.exe.3850000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Orderlist.exe PID: 5836, type: MEMORYSTR
      Machine Learning detection for sampleShow sources
      Source: Orderlist.exeJoe Sandbox ML: detected
      Source: 1.2.Orderlist.exe.37e0000.1.unpackAvira: Label: TR/Patched.Gen
      Source: Orderlist.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: Binary string: wntdll.pdbUGP source: Orderlist.exe, 00000001.00000003.230983802.0000000002090000.00000004.00000001.sdmp
      Source: Binary string: wntdll.pdb source: Orderlist.exe, 00000001.00000003.230983802.0000000002090000.00000004.00000001.sdmp
      Source: Binary string: C:\xampp\htdocs\Cryptor\c84e4bf723534453bcce544eaec30392\Loader\pr1\Release\pr1.pdb source: Orderlist.exe
      Source: C:\Users\user\Desktop\Orderlist.exeCode function: 1_2_004049F7 FindFirstFileExW,

      Networking:

      barindex
      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49714 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49715 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49719 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49720 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49723 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49724 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49725 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49731 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49744 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49745 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49746 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49747 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49748 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49751 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49752 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49753 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49754 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49755 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49756 -> 185.244.30.22:5656
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49757 -> 185.244.30.22:5656
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: sobe123.ddns.net
      Source: Malware configuration extractorURLs: 127.0.0.1
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: sobe123.ddns.net
      Source: global trafficTCP traffic: 192.168.2.5:49714 -> 185.244.30.22:5656
      Source: Joe Sandbox ViewIP Address: 185.244.30.22 185.244.30.22
      Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 67.26.139.254
      Source: unknownTCP traffic detected without corresponding DNS query: 67.26.139.254
      Source: unknownTCP traffic detected without corresponding DNS query: 23.203.69.124
      Source: unknownTCP traffic detected without corresponding DNS query: 23.203.69.124
      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.5.146
      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.200
      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.131
      Source: unknownTCP traffic detected without corresponding DNS query: 67.26.139.254
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.131
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.131
      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
      Source: unknownTCP traffic detected without corresponding DNS query: 67.26.139.254
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.131
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.131
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.131
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.136
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.136
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.136
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.136
      Source: unknownDNS traffic detected: queries for: sobe123.ddns.net
      Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
      Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49675
      Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
      Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49679 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
      Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
      Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49679

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 1.2.Orderlist.exe.3850000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.Orderlist.exe.3850000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Orderlist.exe PID: 5836, type: MEMORYSTR

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 1.2.Orderlist.exe.3850000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 1.2.Orderlist.exe.3850000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 1.2.Orderlist.exe.3850000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 1.2.Orderlist.exe.3850000.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: Orderlist.exe PID: 5836, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: Orderlist.exe PID: 5836, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Initial sample is a PE file and has a suspicious nameShow sources
      Source: initial sampleStatic PE information: Filename: Orderlist.exe
      Source: C:\Users\user\Desktop\Orderlist.exeCode function: 1_2_004133B5
      Source: C:\Users\user\Desktop\Orderlist.exeCode function: 1_2_0040A90D
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 7_2_05050708
      Source: Orderlist.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: Orderlist.exe, 00000001.00000003.233283009.00000000021E6000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Orderlist.exe
      Source: Orderlist.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
      Source: 1.2.Orderlist.exe.3850000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 1.2.Orderlist.exe.3850000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 1.2.Orderlist.exe.3850000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 1.2.Orderlist.exe.3850000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 1.2.Orderlist.exe.3850000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 1.2.Orderlist.exe.3850000.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: Orderlist.exe PID: 5836, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: Orderlist.exe PID: 5836, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: MSBuild.exe, 00000007.00000002.249014021.0000000002EB1000.00000004.00000001.sdmpBinary or memory string: *.sln
      Source: classification engineClassification label: mal100.troj.evad.winEXE@8/9@20/2
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9AJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{8a1be7ed-1b25-4346-8844-80b424a6856e}
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1188:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1324:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD5BB.tmpJump to behavior
      Source: C:\Users\user\Desktop\Orderlist.exeCommand line argument: pr1
      Source: C:\Users\user\Desktop\Orderlist.exeCommand line argument: PR1
      Source: Orderlist.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\Desktop\Orderlist.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: Orderlist.exeReversingLabs: Detection: 26%
      Source: C:\Users\user\Desktop\Orderlist.exeFile read: C:\Users\user\Desktop\Orderlist.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\Orderlist.exe 'C:\Users\user\Desktop\Orderlist.exe'
      Source: C:\Users\user\Desktop\Orderlist.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 'C:\Users\user\Desktop\Orderlist.exe'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD5BB.tmp'
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\Orderlist.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 'C:\Users\user\Desktop\Orderlist.exe'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD5BB.tmp'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: Orderlist.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: wntdll.pdbUGP source: Orderlist.exe, 00000001.00000003.230983802.0000000002090000.00000004.00000001.sdmp
      Source: Binary string: wntdll.pdb source: Orderlist.exe, 00000001.00000003.230983802.0000000002090000.00000004.00000001.sdmp
      Source: Binary string: C:\xampp\htdocs\Cryptor\c84e4bf723534453bcce544eaec30392\Loader\pr1\Release\pr1.pdb source: Orderlist.exe
      Source: C:\Users\user\Desktop\Orderlist.exeCode function: 1_2_00401FB6 push ecx; ret

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD5BB.tmp'

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe:Zone.Identifier read attributes | delete
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: foregroundWindowGot 870
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: foregroundWindowGot 493
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 4188Thread sleep time: -1844674407370954s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 328Thread sleep time: -720000s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1320Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\Orderlist.exeCode function: 1_2_004049F7 FindFirstFileExW,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\Orderlist.exeCode function: 1_2_00404401 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\Desktop\Orderlist.exeCode function: 1_2_004133B5 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Orderlist.exeCode function: 1_2_0040349E mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Orderlist.exeCode function: 1_2_0040572D mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Orderlist.exeCode function: 1_2_00406849 GetProcessHeap,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\Orderlist.exeCode function: 1_2_00401EBD SetUnhandledExceptionFilter,
      Source: C:\Users\user\Desktop\Orderlist.exeCode function: 1_2_00404401 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\Desktop\Orderlist.exeCode function: 1_2_00401888 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Users\user\Desktop\Orderlist.exeCode function: 1_2_00401D2B IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Maps a DLL or memory area into another processShow sources
      Source: C:\Users\user\Desktop\Orderlist.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe protection: execute and read and write
      Source: C:\Users\user\Desktop\Orderlist.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 'C:\Users\user\Desktop\Orderlist.exe'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD5BB.tmp'
      Source: MSBuild.exe, 00000003.00000003.424610803.00000000066CB000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: MSBuild.exe, 00000003.00000003.395438111.00000000066CB000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: MSBuild.exe, 00000003.00000003.386145601.00000000066CB000.00000004.00000001.sdmpBinary or memory string: Program ManagerILE=C:\ProgramDataAPPDATA=C:\Users\user\AppData\RoamingCommonProgramFiles=C:\Program Files (x86)\Common FilesCommonProgramFiles(x86)=C:\Program Files (x86)\Common FilesCommonProgramW6432=C:\Program Files\Common FilesCOMPUTERNAME=DESKT
      Source: MSBuild.exe, 00000003.00000003.411296004.00000000066CA000.00000004.00000001.sdmpBinary or memory string: Program ManageruA_8
      Source: MSBuild.exe, 00000003.00000003.386145601.00000000066CB000.00000004.00000001.sdmpBinary or memory string: Program Manager3
      Source: MSBuild.exe, 00000003.00000003.411296004.00000000066CA000.00000004.00000001.sdmpBinary or memory string: Program Manager*!
      Source: C:\Users\user\Desktop\Orderlist.exeCode function: 1_2_00401FCB cpuid
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Users\user\Desktop\Orderlist.exeCode function: 1_2_00401C13 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 1.2.Orderlist.exe.3850000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.Orderlist.exe.3850000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Orderlist.exe PID: 5836, type: MEMORYSTR

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: Orderlist.exe, 00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 1.2.Orderlist.exe.3850000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.Orderlist.exe.3850000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Orderlist.exe PID: 5836, type: MEMORYSTR

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Process Injection112Masquerading1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsCommand and Scripting Interpreter2Boot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemorySecurity Software Discovery3Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsScheduled Task/Job1Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSVirtualization/Sandbox Evasion21Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Files and Directories1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol22Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing1DCSyncSystem Information Discovery23Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      Orderlist.exe26%ReversingLabsWin32.Backdoor.NanoBot
      Orderlist.exe100%Joe Sandbox ML

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      1.2.Orderlist.exe.37e0000.1.unpack100%AviraTR/Patched.GenDownload File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      127.0.0.10%Avira URL Cloudsafe
      sobe123.ddns.net0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      sobe123.ddns.net
      185.244.30.22
      truetrue
        unknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        127.0.0.1true
        • Avira URL Cloud: safe
        unknown
        sobe123.ddns.nettrue
        • Avira URL Cloud: safe
        unknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        185.244.30.22
        sobe123.ddns.netNetherlands
        209623DAVID_CRAIGGGtrue

        Private

        IP
        192.168.2.1

        General Information

        Joe Sandbox Version:33.0.0 White Diamond
        Analysis ID:458451
        Start date:03.08.2021
        Start time:11:33:46
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 6m 53s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:Orderlist.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:30
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@8/9@20/2
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 98.5% (good quality ratio 90.6%)
        • Quality average: 79.4%
        • Quality standard deviation: 31%
        HCA Information:
        • Successful, ratio: 75%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
        • TCP Packets have been reduced to 100
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
        • Excluded IPs from analysis (whitelisted): 52.147.198.201, 23.211.6.115, 13.88.21.125, 23.211.4.86, 20.82.210.154, 51.103.5.186, 20.54.110.249, 40.112.88.60, 80.67.82.235, 80.67.82.211
        • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        11:34:45API Interceptor972x Sleep call for process: MSBuild.exe modified
        11:34:46Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe" s>$(Arg0)

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        185.244.30.22Orderpdf.exeGet hashmaliciousBrowse
          Permintaan Baru 0010.exeGet hashmaliciousBrowse
            Shipping document PL and BL0070,pdf.exeGet hashmaliciousBrowse
              Shipping document PL and BL0070,pdf.exeGet hashmaliciousBrowse
                Shipping document PL and BL0070,pdf.exeGet hashmaliciousBrowse
                  AWB 686553534 L#U00f4 h#U00e0ng ,pdf.exeGet hashmaliciousBrowse

                    Domains

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    sobe123.ddns.netOrderpdf.exeGet hashmaliciousBrowse
                    • 185.244.30.22

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    DAVID_CRAIGGGOrderpdf.exeGet hashmaliciousBrowse
                    • 185.244.30.22
                    d1IaoX0mpm.exeGet hashmaliciousBrowse
                    • 185.140.53.6
                    ORDER LIST.xlsxGet hashmaliciousBrowse
                    • 185.140.53.6
                    8146Q5rN9g.exeGet hashmaliciousBrowse
                    • 91.193.75.162
                    Scanned Documents 001.docGet hashmaliciousBrowse
                    • 91.193.75.162
                    Quotation Request August RFQ8012021.exeGet hashmaliciousBrowse
                    • 185.140.53.253
                    NEW PO pdf.exeGet hashmaliciousBrowse
                    • 91.193.75.162
                    Permintaan Baru 0010.exeGet hashmaliciousBrowse
                    • 185.244.30.22
                    5yvgVnT8wz.exeGet hashmaliciousBrowse
                    • 185.244.30.23
                    LxYbtlP5nB.exeGet hashmaliciousBrowse
                    • 185.244.30.23
                    eInFMnZWWV.exeGet hashmaliciousBrowse
                    • 185.244.30.143
                    Purchase order FOD-0056-2021-D.exeGet hashmaliciousBrowse
                    • 91.193.75.162
                    ARRIVAL NOTICE FOR NEW ORDER190009.exeGet hashmaliciousBrowse
                    • 185.140.53.142
                    Quotation RequestQR28072021.exeGet hashmaliciousBrowse
                    • 185.140.53.253
                    Spare Parts Requisition-003,004.exeGet hashmaliciousBrowse
                    • 185.244.30.238
                    Order List.exeGet hashmaliciousBrowse
                    • 91.193.75.228
                    Quote 992002892.docGet hashmaliciousBrowse
                    • 185.244.30.238
                    4FNiWwUTLR.exeGet hashmaliciousBrowse
                    • 185.244.30.238
                    PMA21-110.exeGet hashmaliciousBrowse
                    • 91.193.75.228
                    PEDIDO DE COMPRA ASHCROFT - 41901E-001,pdf.exeGet hashmaliciousBrowse
                    • 185.140.53.11

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\MSBuild.exe.log
                    Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):325
                    Entropy (8bit):5.334380084018418
                    Encrypted:false
                    SSDEEP:6:Q3LadLCR22IAQykdL1tZbLsbFLIP12MUAvvro6ysGMFLIP12MUAvvrs:Q3LaJU20NaL1tZbgbe4MqJsGMe4M6
                    MD5:65CE98936A67552310EFE2F0FF5BDF88
                    SHA1:8133653A6B9A169C7496ADE315CED322CFC3613A
                    SHA-256:682F7C55B1B6E189D17755F74959CD08762F91373203B3B982ACFFCADE2E871A
                    SHA-512:2D00AC024267EC384720A400F6D0B4F7EDDF49FAF8AB3C9E6CBFBBAE90ECADACA9022B33E3E8EC92E4F57C7FC830299C8643235EB4AA7D8A6AFE9DD1775F57C3
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..2,"Microsoft.Build.Engine, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build.Framework, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                    C:\Users\user\AppData\Local\Temp\tmpD5BB.tmp
                    Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1320
                    Entropy (8bit):5.136963558289723
                    Encrypted:false
                    SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mnc2xtn:cbk4oL600QydbQxIYODOLedq3ZLj
                    MD5:AE766004C0D8792953BAFFFE8F6A2E3B
                    SHA1:14B12F27543A401E2FE0AF8052E116CAB0032426
                    SHA-256:1ABDD9B6A6B84E4BA1AF1282DC84CE276C59BA253F4C4AF05FEA498A4FD99540
                    SHA-512:E530DA4A5D4336FC37838D0E93B5EB3804B9C489C71F6954A47FC81A4C655BB72EC493E109CF96E6E3617D7623AC80697AD3BBD5FFC6281BAFC8B34DCA5E6567
                    Malicious:true
                    Reputation:moderate, very likely benign file
                    Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                    Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):2320
                    Entropy (8bit):7.089541637477408
                    Encrypted:false
                    SSDEEP:48:IknjhUknjhUknjhUknjhUknjhUknjhUknjhUknjhUknjhUknjhL:HjhDjhDjhDjhDjhDjhDjhDjhDjhDjhL
                    MD5:2CC2E05CB39A76B255530F61BA4AA2E3
                    SHA1:76BD6001B1922B2B3FB2F618740FA74A6C532A7F
                    SHA-256:FBF89196FF1A9FC33EE6C42DC0A959DAA89E2322F3417C77534C9968C0885271
                    SHA-512:2EACD3A81456781803A9C14F7471DBBDB126BBE7AEC3105B1A49AB115A8BB831EA0D1DF48BAB00EB8231B114EAE5A03DF73A7A60B45BA03CB2F92382CF4DBB38
                    Malicious:false
                    Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                    Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):8
                    Entropy (8bit):3.0
                    Encrypted:false
                    SSDEEP:3:z5Tt:Vh
                    MD5:5AE21F9EFD353DB4655E78BF1D985A51
                    SHA1:BE4FA7084E270D516D19CB9FD57DEFDC51407AD0
                    SHA-256:9FA1633CB2F77A3059A545A5C99CDB30E669304A050DCA66F79308423575FF94
                    SHA-512:B84F1CB9B768B92543C4847E4E6E863AB59D0F676E09A2A6B0BB550695208CB8DAF9801678A7DBDC2E4F41A363E0AF018B1F505F7840D5A5FD77E69EF8F6D34C
                    Malicious:true
                    Preview: ..+\.V.H
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bak
                    Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):24
                    Entropy (8bit):4.584962500721156
                    Encrypted:false
                    SSDEEP:3:9bzY6oRDJoTBn:RzWDqTB
                    MD5:3FCC766D28BFD974C68B38C27D0D7A9A
                    SHA1:45ED19A78D9B79E46EDBFC3E3CA58E90423A676B
                    SHA-256:39A25F1AB5099005A74CF04F3C61C3253CD9BDA73B85228B58B45AAA4E838641
                    SHA-512:C7D47BDAABEEBB8C9D9B31CC4CE968EAF291771762FA022A2F55F9BA4838E71FDBD3F83792709E47509C5D94629D6D274CC933371DC01560D13016D944012DA5
                    Malicious:false
                    Preview: 9iH...}Z.4..f.....l.d
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                    Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):64
                    Entropy (8bit):5.425704882778696
                    Encrypted:false
                    SSDEEP:3:9bzY6oRDJoTBPcgY6oRDMjmPl:RzWDqTdRWDMCd
                    MD5:CA214D2E41394F5ADA74FA4F2EA15CB5
                    SHA1:32E3F863838177349F2AF70CA1CE695B3C184166
                    SHA-256:B6E370AF3F5C1001C79BC19706D1A5B1803C59BC45AEFAB4BD18FC67034F47A1
                    SHA-512:E9C268BCDE8872F4DD2964ACA6F9C51834E42E2AF7FF2E1C327573CEDC98127B0EDBBF8E76E456FFF82A28FC46A210D91EEEA2242ECED5368D107436B3492C14
                    Malicious:false
                    Preview: 9iH...}Z.4..f.....l.d9iH...}Z.4..f..... 8.j....|.&X..e.F.*.
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                    Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):426832
                    Entropy (8bit):7.999527918131335
                    Encrypted:true
                    SSDEEP:6144:zKfHbamD8WN+JQYrjM7Ei2CsFJjyh9zvgPonV5HqZcPVT4Eb+Z6no3QSzjeMsdF/:zKf137EiDsTjevgArYcPVLoTQS+0iv
                    MD5:653DDDCB6C89F6EC51F3DDC0053C5914
                    SHA1:4CF7E7D42495CE01C261E4C5C4B8BF6CD76CCEE5
                    SHA-256:83B9CAE66800C768887FB270728F6806CBEBDEAD9946FA730F01723847F17FF9
                    SHA-512:27A467F2364C21CD1C6C34EF1CA5FFB09B4C3180FC9C025E293374EB807E4382108617BB4B97F8EBBC27581CD6E5988BB5E21276B3CB829C1C0E49A6FC9463A0
                    Malicious:false
                    Preview: ..g&jo...IPg...GM....R>i...o...I.>.&.r{....8...}...E....v.!7.u3e.. .....db...}.......".t(.xC9.cp.B....7...'.......%......w.^.._.......B.W%.<..i.0.{9.xS...5...)..w..$..C..?`F..u.5.T.X.w'Si..z.n{...Y!m...RA...xg....[7...z..9@.K.-...T..+.ACe....R....enO.....AoNMT.\^....}H&..4I...B.:..@..J...v..rI5..kP......2j....B..B.~.T..>.c..emW;Rn<9..[.r.o....R[....@=...:...L.g<.....I..%4[.G^.~.l'......v.p&.........+..S...9d/.{..H.`@.1..........f.\s...X.a.].<.h*...J4*...k.x....%3.......3.c..?%....>.!.}..)(.{...H...3..`'].Q.[sN..JX(.%pH....+......(...v.....H...3..8.a_..J..?4...y.N(..D.*h..g.jD..I...44Q?..N......oX.A......l...n?./..........$.!..;.^9"H........*...OkF....v.m_.e.v..f...."..bq{.....O.-....%R+...-..P.i..t5....2Z# ...#...,L..{..j..heT -=Z.P;...g.m)<owJ].J..../.p..8.u8.&..#.m9...j%..g&....g.x.I,....u.[....>./W...........*X...b*Z...ex.0..x.}.....Tb...[..H_M._.^N.d&...g._."@4N.pDs].GbT.......&p........Nw...%$=.....{..J.1....2....<E{..<!G..
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                    Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):57
                    Entropy (8bit):4.85263908467479
                    Encrypted:false
                    SSDEEP:3:oMty8WbSI1u:oMLWuI1u
                    MD5:A35128E4E28B27328F70E4E8FF482443
                    SHA1:B89066B2F8DB34299AABFD7ABEE402D5444DD079
                    SHA-256:88AEA00733DC4B570A29D56A423CC5BF163E5ACE7AF349972EB0BBA8D9AD06E1
                    SHA-512:F098E844B5373B34642B49B6E0F2E15CFDAA1A8B6CABC2196CEC0F3765289E5B1FD4AB588DD65F97C8E51FA9A81077621E9A06946859F296904C646906A70F33
                    Malicious:false
                    Preview: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                    \Device\ConDrv
                    Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):235
                    Entropy (8bit):5.107306146099542
                    Encrypted:false
                    SSDEEP:6:zx3M1tlAX8bSWR30qysGMQbSVRRZBXVRbJ0fFPRAgRYan:zK1XnV30ZsGMIG9BFRbQ5AUYan
                    MD5:67DDD8252A246E7B14649B0063E351C0
                    SHA1:AAE1C6839D1CC4A626D0FB2D4773823AD209FA17
                    SHA-256:24C8283BA3F7FCA2E4CEF6F141263DD1E8A36E5A5CD96A97BFE83525D7663116
                    SHA-512:326A5E0A440F60D4808C91499F1F3616C496B67DC053B4A2A40B0FE09002074AE5365018781F8746E98E7E3CFCD35F1310D17FB7C2138A8157318E6791987025
                    Malicious:false
                    Preview: Microsoft (R) Build Engine Version 2.0.50727.8922..[Microsoft .NET Framework, Version 2.0.50727.8922]..Copyright (C) Microsoft Corporation 2005. All rights reserved.....MSBUILD : error MSB1009: Project file does not exist...Switch: 0..

                    Static File Info

                    General

                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.566964052983995
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:Orderlist.exe
                    File size:457359
                    MD5:57201aec028c2bd9a91e79ed81aeb868
                    SHA1:150471c9ac6f4324bbcd1a3852d1755fed87440a
                    SHA256:580eb6d5dffc61f35b4fe0ea5c0ab113af6f39e971282f9fff016b7f54d036ab
                    SHA512:f7158703ec8359936dcf6a48b045d0b427f594dc0dd5daed66d043ccb696debe0bf44b7861de23903220359ea074478102601203f74d82c7439549bd97116828
                    SSDEEP:12288:0NmRAtaiaYtrH398p37jUSDNlXPn66tVhP9Cx:0Nm6nHN8pLjUSppn6eQx
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........a9.p.j.p.j.p.j...k.p.j...k.p.j...k.p.j...k.p.j...k.p.j...k.p.j...k.p.j.p.j.p.j...k.p.j...j.p.j.p.j.p.j...k.p.jRich.p.j.......

                    File Icon

                    Icon Hash:10ecd4d2d8cce400

                    Static PE Info

                    General

                    Entrypoint:0x40187e
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                    DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
                    Time Stamp:0x6108F2D1 [Tue Aug 3 07:40:01 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:47132e7294d9df76f8ee6d6805dd5e2d

                    Entrypoint Preview

                    Instruction
                    call 00007FB820BA3875h
                    jmp 00007FB820BA3373h
                    push ebp
                    mov ebp, esp
                    push 00000000h
                    call dword ptr [0040D040h]
                    push dword ptr [ebp+08h]
                    call dword ptr [0040D03Ch]
                    push C0000409h
                    call dword ptr [0040D044h]
                    push eax
                    call dword ptr [0040D048h]
                    pop ebp
                    ret
                    push ebp
                    mov ebp, esp
                    sub esp, 00000324h
                    push 00000017h
                    call 00007FB820BACAF9h
                    test eax, eax
                    je 00007FB820BA34E7h
                    push 00000002h
                    pop ecx
                    int 29h
                    mov dword ptr [00413F20h], eax
                    mov dword ptr [00413F1Ch], ecx
                    mov dword ptr [00413F18h], edx
                    mov dword ptr [00413F14h], ebx
                    mov dword ptr [00413F10h], esi
                    mov dword ptr [00413F0Ch], edi
                    mov word ptr [00413F38h], ss
                    mov word ptr [00413F2Ch], cs
                    mov word ptr [00413F08h], ds
                    mov word ptr [00413F04h], es
                    mov word ptr [00413F00h], fs
                    mov word ptr [00413EFCh], gs
                    pushfd
                    pop dword ptr [00413F30h]
                    mov eax, dword ptr [ebp+00h]
                    mov dword ptr [00413F24h], eax
                    mov eax, dword ptr [ebp+04h]
                    mov dword ptr [00413F28h], eax
                    lea eax, dword ptr [ebp+08h]
                    mov dword ptr [00413F34h], eax
                    mov eax, dword ptr [ebp-00000324h]
                    mov dword ptr [00413E70h], 00010001h

                    Rich Headers

                    Programming Language:
                    • [LNK] VS2015 UPD3.1 build 24215
                    • [ C ] VS2015 UPD3.1 build 24215
                    • [RES] VS2015 UPD3 build 24213

                    Data Directories

                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x1222c0x50.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x29388.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x11ac00x54.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x11b180x40.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0xd0000x164.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                    Sections

                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000xb0b40xb200False0.589339009831data6.61597401291IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    .rdata0xd0000x5a080x5c00False0.414996603261data4.86737104146IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x130000x1b240x1000False0.2392578125data2.69306515191IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                    .gfids0x150000xb40x200False0.205078125data0.920266383871IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .rsrc0x160000x293880x29400False0.0764678030303data3.16536919122IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                    Resources

                    NameRVASizeTypeLanguageCountry
                    RT_ICON0x163900x147aPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                    RT_ICON0x178100x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                    RT_ICON0x280380x94a8dataEnglishUnited States
                    RT_ICON0x314e00x5488dataEnglishUnited States
                    RT_ICON0x369680x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295EnglishUnited States
                    RT_ICON0x3ab900x25a8dataEnglishUnited States
                    RT_ICON0x3d1380x10a8dataEnglishUnited States
                    RT_ICON0x3e1e00x988dataEnglishUnited States
                    RT_ICON0x3eb680x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                    RT_MENU0x3f0580x4adataEnglishUnited States
                    RT_DIALOG0x3f0b80x120dataEnglishUnited States
                    RT_STRING0x3f1d80x2cdataEnglishUnited States
                    RT_ACCELERATOR0x3f0a80x10dataEnglishUnited States
                    RT_GROUP_ICON0x3efd00x84dataEnglishUnited States
                    RT_MANIFEST0x3f2080x17dXML 1.0 document textEnglishUnited States

                    Imports

                    DLLImport
                    KERNEL32.dllDecodePointer, WriteConsoleW, CloseHandle, CreateFileW, SetFilePointerEx, GetConsoleMode, FlushFileBuffers, HeapReAlloc, HeapSize, GetProcessHeap, LCMapStringW, GetConsoleOutputCP, VirtualProtect, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwind, GetLastError, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, HeapFree, HeapAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetFileType, GetStringTypeW, RaiseException
                    USER32.dllLoadIconW, LoadCursorW, EndPaint, BeginPaint, GetDC, UpdateWindow, GrayStringA, TranslateAcceleratorW, LoadAcceleratorsW, EndDialog, DialogBoxParamW, ShowWindow, DestroyWindow, CreateWindowExW, RegisterClassExW, PostQuitMessage, DefWindowProcW, DispatchMessageW, TranslateMessage, GetMessageW, LoadStringW
                    GDI32.dllCreateSolidBrush

                    Possible Origin

                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States

                    Network Behavior

                    Snort IDS Alerts

                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    08/03/21-11:34:46.556393TCP2025019ET TROJAN Possible NanoCore C2 60B497145656192.168.2.5185.244.30.22
                    08/03/21-11:34:52.608063TCP2025019ET TROJAN Possible NanoCore C2 60B497155656192.168.2.5185.244.30.22
                    08/03/21-11:34:59.093082TCP2025019ET TROJAN Possible NanoCore C2 60B497195656192.168.2.5185.244.30.22
                    08/03/21-11:35:05.122589TCP2025019ET TROJAN Possible NanoCore C2 60B497205656192.168.2.5185.244.30.22
                    08/03/21-11:35:11.198158TCP2025019ET TROJAN Possible NanoCore C2 60B497235656192.168.2.5185.244.30.22
                    08/03/21-11:35:19.298793TCP2025019ET TROJAN Possible NanoCore C2 60B497245656192.168.2.5185.244.30.22
                    08/03/21-11:35:25.306945TCP2025019ET TROJAN Possible NanoCore C2 60B497255656192.168.2.5185.244.30.22
                    08/03/21-11:35:31.535213TCP2025019ET TROJAN Possible NanoCore C2 60B497315656192.168.2.5185.244.30.22
                    08/03/21-11:35:37.723027TCP2025019ET TROJAN Possible NanoCore C2 60B497445656192.168.2.5185.244.30.22
                    08/03/21-11:35:44.442768TCP2025019ET TROJAN Possible NanoCore C2 60B497455656192.168.2.5185.244.30.22
                    08/03/21-11:35:50.943540TCP2025019ET TROJAN Possible NanoCore C2 60B497465656192.168.2.5185.244.30.22
                    08/03/21-11:35:57.169057TCP2025019ET TROJAN Possible NanoCore C2 60B497475656192.168.2.5185.244.30.22
                    08/03/21-11:36:04.419421TCP2025019ET TROJAN Possible NanoCore C2 60B497485656192.168.2.5185.244.30.22
                    08/03/21-11:36:10.588078TCP2025019ET TROJAN Possible NanoCore C2 60B497515656192.168.2.5185.244.30.22
                    08/03/21-11:36:16.760728TCP2025019ET TROJAN Possible NanoCore C2 60B497525656192.168.2.5185.244.30.22
                    08/03/21-11:36:22.878749TCP2025019ET TROJAN Possible NanoCore C2 60B497535656192.168.2.5185.244.30.22
                    08/03/21-11:36:28.835778TCP2025019ET TROJAN Possible NanoCore C2 60B497545656192.168.2.5185.244.30.22
                    08/03/21-11:36:34.868021TCP2025019ET TROJAN Possible NanoCore C2 60B497555656192.168.2.5185.244.30.22
                    08/03/21-11:36:40.949402TCP2025019ET TROJAN Possible NanoCore C2 60B497565656192.168.2.5185.244.30.22
                    08/03/21-11:36:46.919926TCP2025019ET TROJAN Possible NanoCore C2 60B497575656192.168.2.5185.244.30.22

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Aug 3, 2021 11:34:35.800501108 CEST49699443192.168.2.5131.253.33.200
                    Aug 3, 2021 11:34:35.800672054 CEST49699443192.168.2.5131.253.33.200
                    Aug 3, 2021 11:34:35.800734043 CEST49699443192.168.2.5131.253.33.200
                    Aug 3, 2021 11:34:35.800786018 CEST49699443192.168.2.5131.253.33.200
                    Aug 3, 2021 11:34:35.800827026 CEST49699443192.168.2.5131.253.33.200
                    Aug 3, 2021 11:34:35.800848961 CEST49699443192.168.2.5131.253.33.200
                    Aug 3, 2021 11:34:35.800865889 CEST49699443192.168.2.5131.253.33.200
                    Aug 3, 2021 11:34:35.800894976 CEST49699443192.168.2.5131.253.33.200
                    Aug 3, 2021 11:34:35.800909996 CEST49699443192.168.2.5131.253.33.200
                    Aug 3, 2021 11:34:35.800925970 CEST49699443192.168.2.5131.253.33.200
                    Aug 3, 2021 11:34:35.825776100 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.825845957 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.825871944 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.825901985 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.825932026 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.825958967 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.825985909 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826075077 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826097012 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826105118 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826112986 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826121092 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826134920 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826147079 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826158047 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826170921 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826181889 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826195002 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826210022 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826221943 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826235056 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826246977 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826260090 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826272011 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826281071 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826292038 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826299906 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826311111 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826318979 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826329947 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826338053 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826349974 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826356888 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826361895 CEST49699443192.168.2.5131.253.33.200
                    Aug 3, 2021 11:34:35.826364994 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826376915 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826387882 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826399088 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826411009 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.826426029 CEST49699443192.168.2.5131.253.33.200
                    Aug 3, 2021 11:34:35.878209114 CEST44349699131.253.33.200192.168.2.5
                    Aug 3, 2021 11:34:35.879103899 CEST49699443192.168.2.5131.253.33.200
                    Aug 3, 2021 11:34:46.366614103 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:46.490384102 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:46.490490913 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:46.556392908 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:46.728601933 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:46.728753090 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:46.914460897 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:46.914534092 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:46.961085081 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:46.961189985 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.082659006 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.082794905 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.128493071 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.128571987 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.231672049 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.275758982 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.316654921 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.316730976 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.494874954 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.494999886 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.495129108 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.495131016 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.495179892 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.495196104 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.495197058 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.495227098 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.495248079 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.495258093 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.495275021 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.495309114 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.495311975 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.495352983 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.495354891 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.495385885 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.495434999 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.495675087 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.496052980 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.623244047 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.623382092 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.632687092 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.633326054 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.633418083 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.633833885 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.643302917 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.643399954 CEST497145656192.168.2.5185.244.30.22
                    Aug 3, 2021 11:34:47.643456936 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.643481016 CEST565649714185.244.30.22192.168.2.5
                    Aug 3, 2021 11:34:47.643501997 CEST565649714185.244.30.22192.168.2.5

                    UDP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Aug 3, 2021 11:34:33.043502092 CEST4955753192.168.2.58.8.8.8
                    Aug 3, 2021 11:34:33.081146955 CEST53495578.8.8.8192.168.2.5
                    Aug 3, 2021 11:34:33.216557026 CEST6173353192.168.2.58.8.8.8
                    Aug 3, 2021 11:34:33.266155958 CEST53617338.8.8.8192.168.2.5
                    Aug 3, 2021 11:34:33.768606901 CEST6544753192.168.2.58.8.8.8
                    Aug 3, 2021 11:34:33.796195984 CEST53654478.8.8.8192.168.2.5
                    Aug 3, 2021 11:34:34.826149940 CEST5244153192.168.2.58.8.8.8
                    Aug 3, 2021 11:34:34.851886034 CEST53524418.8.8.8192.168.2.5
                    Aug 3, 2021 11:34:35.841332912 CEST6217653192.168.2.58.8.8.8
                    Aug 3, 2021 11:34:35.866219997 CEST53621768.8.8.8192.168.2.5
                    Aug 3, 2021 11:34:37.628715992 CEST5959653192.168.2.58.8.8.8
                    Aug 3, 2021 11:34:37.653671026 CEST53595968.8.8.8192.168.2.5
                    Aug 3, 2021 11:34:38.673630953 CEST6529653192.168.2.58.8.8.8
                    Aug 3, 2021 11:34:38.706933022 CEST53652968.8.8.8192.168.2.5
                    Aug 3, 2021 11:34:39.438411951 CEST6318353192.168.2.58.8.8.8
                    Aug 3, 2021 11:34:39.474415064 CEST53631838.8.8.8192.168.2.5
                    Aug 3, 2021 11:34:40.172255039 CEST6015153192.168.2.58.8.8.8
                    Aug 3, 2021 11:34:40.207861900 CEST53601518.8.8.8192.168.2.5
                    Aug 3, 2021 11:34:42.894826889 CEST5696953192.168.2.58.8.8.8
                    Aug 3, 2021 11:34:42.919682026 CEST53569698.8.8.8192.168.2.5
                    Aug 3, 2021 11:34:44.711934090 CEST5516153192.168.2.58.8.8.8
                    Aug 3, 2021 11:34:44.736749887 CEST53551618.8.8.8192.168.2.5
                    Aug 3, 2021 11:34:46.300275087 CEST5475753192.168.2.58.8.8.8
                    Aug 3, 2021 11:34:46.335510015 CEST53547578.8.8.8192.168.2.5
                    Aug 3, 2021 11:34:52.439148903 CEST4999253192.168.2.58.8.8.8
                    Aug 3, 2021 11:34:52.474721909 CEST53499928.8.8.8192.168.2.5
                    Aug 3, 2021 11:34:56.256779909 CEST6007553192.168.2.58.8.8.8
                    Aug 3, 2021 11:34:56.311990023 CEST53600758.8.8.8192.168.2.5
                    Aug 3, 2021 11:34:58.911879063 CEST5501653192.168.2.58.8.8.8
                    Aug 3, 2021 11:34:58.948497057 CEST53550168.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:04.963385105 CEST6434553192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:04.996550083 CEST53643458.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:05.362282038 CEST5712853192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:05.414614916 CEST53571288.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:11.048209906 CEST5479153192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:11.072742939 CEST53547918.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:19.131186962 CEST5046353192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:19.163836002 CEST53504638.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:25.141386986 CEST5039453192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:25.179255009 CEST53503948.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:27.505357027 CEST5853053192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:27.540448904 CEST53585308.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:29.502216101 CEST5381353192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:29.583549976 CEST53538138.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:30.212558985 CEST6373253192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:30.246483088 CEST53637328.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:30.745430946 CEST5734453192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:30.780872107 CEST53573448.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:31.176371098 CEST5445053192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:31.209872007 CEST53544508.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:31.373980999 CEST5926153192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:31.407829046 CEST53592618.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:31.411180019 CEST5715153192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:31.454351902 CEST53571518.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:31.972104073 CEST5941353192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:32.031208038 CEST53594138.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:32.528851032 CEST6051653192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:32.565897942 CEST53605168.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:33.261357069 CEST5164953192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:33.293668032 CEST53516498.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:34.305075884 CEST6508653192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:34.337343931 CEST53650868.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:35.153357983 CEST5643253192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:35.191082954 CEST53564328.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:35.575184107 CEST5292953192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:35.607692957 CEST53529298.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:35.998090982 CEST6431753192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:36.034967899 CEST53643178.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:37.551378012 CEST6100453192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:37.578969955 CEST53610048.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:44.286135912 CEST5689553192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:44.318723917 CEST53568958.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:50.717076063 CEST6237253192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:50.754591942 CEST53623728.8.8.8192.168.2.5
                    Aug 3, 2021 11:35:56.923703909 CEST6151553192.168.2.58.8.8.8
                    Aug 3, 2021 11:35:56.957531929 CEST53615158.8.8.8192.168.2.5
                    Aug 3, 2021 11:36:04.220123053 CEST5667553192.168.2.58.8.8.8
                    Aug 3, 2021 11:36:04.254407883 CEST53566758.8.8.8192.168.2.5
                    Aug 3, 2021 11:36:05.665716887 CEST5717253192.168.2.58.8.8.8
                    Aug 3, 2021 11:36:05.698512077 CEST53571728.8.8.8192.168.2.5
                    Aug 3, 2021 11:36:07.960078955 CEST5526753192.168.2.58.8.8.8
                    Aug 3, 2021 11:36:08.000164032 CEST53552678.8.8.8192.168.2.5
                    Aug 3, 2021 11:36:10.335843086 CEST5096953192.168.2.58.8.8.8
                    Aug 3, 2021 11:36:10.369540930 CEST53509698.8.8.8192.168.2.5
                    Aug 3, 2021 11:36:16.592588902 CEST6436253192.168.2.58.8.8.8
                    Aug 3, 2021 11:36:16.628025055 CEST53643628.8.8.8192.168.2.5
                    Aug 3, 2021 11:36:22.705518007 CEST5476653192.168.2.58.8.8.8
                    Aug 3, 2021 11:36:22.741219044 CEST53547668.8.8.8192.168.2.5
                    Aug 3, 2021 11:36:28.675108910 CEST6144653192.168.2.58.8.8.8
                    Aug 3, 2021 11:36:28.707896948 CEST53614468.8.8.8192.168.2.5
                    Aug 3, 2021 11:36:34.704138994 CEST5751553192.168.2.58.8.8.8
                    Aug 3, 2021 11:36:34.739733934 CEST53575158.8.8.8192.168.2.5
                    Aug 3, 2021 11:36:40.767715931 CEST5819953192.168.2.58.8.8.8
                    Aug 3, 2021 11:36:40.800370932 CEST53581998.8.8.8192.168.2.5
                    Aug 3, 2021 11:36:46.760056973 CEST6522153192.168.2.58.8.8.8
                    Aug 3, 2021 11:36:46.793041945 CEST53652218.8.8.8192.168.2.5

                    DNS Queries

                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Aug 3, 2021 11:34:46.300275087 CEST192.168.2.58.8.8.80x7b0eStandard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:34:52.439148903 CEST192.168.2.58.8.8.80xb04aStandard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:34:58.911879063 CEST192.168.2.58.8.8.80xd65Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:04.963385105 CEST192.168.2.58.8.8.80x8673Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:11.048209906 CEST192.168.2.58.8.8.80xa298Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:19.131186962 CEST192.168.2.58.8.8.80xde5eStandard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:25.141386986 CEST192.168.2.58.8.8.80xd66eStandard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:31.373980999 CEST192.168.2.58.8.8.80x70daStandard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:37.551378012 CEST192.168.2.58.8.8.80x53a0Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:44.286135912 CEST192.168.2.58.8.8.80x8f61Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:50.717076063 CEST192.168.2.58.8.8.80x13fbStandard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:56.923703909 CEST192.168.2.58.8.8.80xe1dbStandard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:36:04.220123053 CEST192.168.2.58.8.8.80x7ff8Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:36:10.335843086 CEST192.168.2.58.8.8.80x282dStandard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:36:16.592588902 CEST192.168.2.58.8.8.80xcf9bStandard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:36:22.705518007 CEST192.168.2.58.8.8.80xccc2Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:36:28.675108910 CEST192.168.2.58.8.8.80xc211Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:36:34.704138994 CEST192.168.2.58.8.8.80x6614Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:36:40.767715931 CEST192.168.2.58.8.8.80xc7b1Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)
                    Aug 3, 2021 11:36:46.760056973 CEST192.168.2.58.8.8.80x6d01Standard query (0)sobe123.ddns.netA (IP address)IN (0x0001)

                    DNS Answers

                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Aug 3, 2021 11:34:46.335510015 CEST8.8.8.8192.168.2.50x7b0eNo error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:34:52.474721909 CEST8.8.8.8192.168.2.50xb04aNo error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:34:58.948497057 CEST8.8.8.8192.168.2.50xd65No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:04.996550083 CEST8.8.8.8192.168.2.50x8673No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:11.072742939 CEST8.8.8.8192.168.2.50xa298No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:19.163836002 CEST8.8.8.8192.168.2.50xde5eNo error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:25.179255009 CEST8.8.8.8192.168.2.50xd66eNo error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:31.407829046 CEST8.8.8.8192.168.2.50x70daNo error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:37.578969955 CEST8.8.8.8192.168.2.50x53a0No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:44.318723917 CEST8.8.8.8192.168.2.50x8f61No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:50.754591942 CEST8.8.8.8192.168.2.50x13fbNo error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:35:56.957531929 CEST8.8.8.8192.168.2.50xe1dbNo error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:36:04.254407883 CEST8.8.8.8192.168.2.50x7ff8No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:36:10.369540930 CEST8.8.8.8192.168.2.50x282dNo error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:36:16.628025055 CEST8.8.8.8192.168.2.50xcf9bNo error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:36:22.741219044 CEST8.8.8.8192.168.2.50xccc2No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:36:28.707896948 CEST8.8.8.8192.168.2.50xc211No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:36:34.739733934 CEST8.8.8.8192.168.2.50x6614No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:36:40.800370932 CEST8.8.8.8192.168.2.50xc7b1No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)
                    Aug 3, 2021 11:36:46.793041945 CEST8.8.8.8192.168.2.50x6d01No error (0)sobe123.ddns.net185.244.30.22A (IP address)IN (0x0001)

                    Code Manipulations

                    Statistics

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:11:34:38
                    Start date:03/08/2021
                    Path:C:\Users\user\Desktop\Orderlist.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Users\user\Desktop\Orderlist.exe'
                    Imagebase:0x400000
                    File size:457359 bytes
                    MD5 hash:57201AEC028C2BD9A91E79ED81AEB868
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.236917800.0000000003850000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    Reputation:low

                    General

                    Start time:11:34:39
                    Start date:03/08/2021
                    Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Users\user\Desktop\Orderlist.exe'
                    Imagebase:0xad0000
                    File size:69632 bytes
                    MD5 hash:88BBB7610152B48C2B3879473B17857E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Reputation:moderate

                    General

                    Start time:11:34:44
                    Start date:03/08/2021
                    Path:C:\Windows\SysWOW64\schtasks.exe
                    Wow64 process (32bit):true
                    Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD5BB.tmp'
                    Imagebase:0x12e0000
                    File size:185856 bytes
                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:11:34:44
                    Start date:03/08/2021
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7ecfc0000
                    File size:625664 bytes
                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:11:34:46
                    Start date:03/08/2021
                    Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0
                    Imagebase:0x890000
                    File size:69632 bytes
                    MD5 hash:88BBB7610152B48C2B3879473B17857E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Reputation:moderate

                    General

                    Start time:11:34:46
                    Start date:03/08/2021
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff797770000
                    File size:625664 bytes
                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Disassembly

                    Code Analysis

                    Reset < >