Loading ...

Play interactive tourEdit tour

Windows Analysis Report P0 (2021)-2790 new order.exe

Overview

General Information

Sample Name:P0 (2021)-2790 new order.exe
Analysis ID:483496
MD5:394ff651c9fa2bfca16c32fb117514e1
SHA1:e9ae9e9c2985aaa1c96c7186f9147eebddb7b203
SHA256:25cc795662dc5f48d3e7dc1fcab5add2deed04887f7cfef18d1d4a3d7abf5ee7
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Multi AV Scanner detection for domain / URL
Yara detected Nanocore RAT
Maps a DLL or memory area into another process
Initial sample is a PE file and has a suspicious name
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains strange resources
Drops PE files
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • P0 (2021)-2790 new order.exe (PID: 6380 cmdline: 'C:\Users\user\Desktop\P0 (2021)-2790 new order.exe' MD5: 394FF651C9FA2BFCA16C32FB117514E1)
    • conhost.exe (PID: 6388 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • MSBuild.exe (PID: 6440 cmdline: 'C:\Users\user\Desktop\P0 (2021)-2790 new order.exe' MD5: 88BBB7610152B48C2B3879473B17857E)
      • schtasks.exe (PID: 6652 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7C69.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6724 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp8052.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • MSBuild.exe (PID: 6824 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0 MD5: 88BBB7610152B48C2B3879473B17857E)
    • conhost.exe (PID: 6832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6840 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 88BBB7610152B48C2B3879473B17857E)
    • conhost.exe (PID: 6848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 7028 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 88BBB7610152B48C2B3879473B17857E)
    • conhost.exe (PID: 7036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "6e073bd7-7c11-48c2-8a90-355dddea", "Group": "Default", "Domain1": "185.140.53.8", "Domain2": "", "Port": 8907, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Enable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "", "BackupDNSServer": "185.140.53.8", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.479823366.0000000000402000.00000040.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000002.00000002.479823366.0000000000402000.00000040.00020000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000002.00000002.479823366.0000000000402000.00000040.00020000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000002.00000002.484597915.00000000040C9000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000002.00000002.485007729.0000000005A20000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      Click to see the 14 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      2.2.MSBuild.exe.5cc0000.6.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xd9ad:$x1: NanoCore.ClientPluginHost
      • 0xd9da:$x2: IClientNetworkHost
      2.2.MSBuild.exe.5cc0000.6.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xd9ad:$x2: NanoCore.ClientPluginHost
      • 0xea88:$s4: PipeCreated
      • 0xd9c7:$s5: IClientLoggingHost
      2.2.MSBuild.exe.5cc0000.6.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        2.2.MSBuild.exe.40d7a70.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xf7ad:$x1: NanoCore.ClientPluginHost
        • 0xf7da:$x2: IClientNetworkHost
        2.2.MSBuild.exe.40d7a70.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xf7ad:$x2: NanoCore.ClientPluginHost
        • 0x10888:$s4: PipeCreated
        • 0xf7c7:$s5: IClientLoggingHost
        Click to see the 29 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 6440, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 6440, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 6440, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 6440, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000002.00000002.484597915.00000000040C9000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6e073bd7-7c11-48c2-8a90-355dddea", "Group": "Default", "Domain1": "185.140.53.8", "Domain2": "", "Port": 8907, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Enable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "", "BackupDNSServer": "185.140.53.8", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Multi AV Scanner detection for domain / URLShow sources
        Source: 185.140.53.8Virustotal: Detection: 11%Perma Link
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 2.2.MSBuild.exe.5cc0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.40d7a70.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.40d7a70.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.5cc0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.40dc099.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.5cc4629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000002.00000002.479823366.0000000000402000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.484597915.00000000040C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.223144000.0000000002720000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.485086472.0000000005CC0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: P0 (2021)-2790 new order.exe PID: 6380, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6440, type: MEMORYSTR
        Source: 2.2.MSBuild.exe.5cc0000.6.unpackAvira: Label: TR/NanoCore.fadte
        Source: 2.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: P0 (2021)-2790 new order.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: P0 (2021)-2790 new order.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdbind source: MSBuild.exe, 00000002.00000002.482252225.0000000002CB5000.00000004.00000040.sdmp
        Source: Binary string: indows\MSBuild.pdbpdbild.p source: MSBuild.exe, 00000002.00000002.482252225.0000000002CB5000.00000004.00000040.sdmp
        Source: Binary string: wntdll.pdbUGP source: P0 (2021)-2790 new order.exe, 00000000.00000003.219629284.0000000002860000.00000004.00000001.sdmp
        Source: Binary string: wntdll.pdb source: P0 (2021)-2790 new order.exe, 00000000.00000003.219629284.0000000002860000.00000004.00000001.sdmp
        Source: Binary string: C:\Windows\System.pdb\W44FX source: MSBuild.exe, 00000002.00000002.482252225.0000000002CB5000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\dll\System.pdbSy source: MSBuild.exe, 00000002.00000002.482252225.0000000002CB5000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.pdb source: MSBuild.exe, 00000002.00000002.482252225.0000000002CB5000.00000004.00000040.sdmp
        Source: Binary string: indows\System.pdbpdbtem.pdb F source: MSBuild.exe, 00000002.00000002.482252225.0000000002CB5000.00000004.00000040.sdmp
        Source: Binary string: f:\dd\vsproject\xmake\XMakeCommandLine\objr\i386\MSBuild.pdb source: dhcpmon.exe, dhcpmon.exe.2.dr
        Source: Binary string: System.pdb source: MSBuild.exe, 00000002.00000002.482252225.0000000002CB5000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\symbols\dll\System.pdbse source: MSBuild.exe, 00000002.00000002.482252225.0000000002CB5000.00000004.00000040.sdmp

        Networking:

        barindex
        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49735 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49736 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49737 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49742 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49745 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49746 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49747 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49754 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49774 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49775 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49779 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49786 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49787 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49788 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49789 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49790 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49795 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49796 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49797 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49798 -> 185.140.53.8:8907
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49799 -> 185.140.53.8:8907
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs:
        Source: Malware configuration extractorURLs: 185.140.53.8
        Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
        Source: Joe Sandbox ViewIP Address: 185.140.53.8 185.140.53.8
        Source: global trafficTCP traffic: 192.168.2.3:49735 -> 185.140.53.8:8907
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49686
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49685
        Source: unknownNetwork traffic detected: HTTP traffic on port 49679 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49682
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
        Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49682 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49679
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_052E2E76 WSARecv,
        Source: dhcpmon.exe, 0000000C.00000002.233523050.0000000000798000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: MSBuild.exe, 00000002.00000002.484597915.00000000040C9000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 2.2.MSBuild.exe.5cc0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.40d7a70.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.40d7a70.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.5cc0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.40dc099.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.5cc4629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000002.00000002.479823366.0000000000402000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.484597915.00000000040C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.223144000.0000000002720000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.485086472.0000000005CC0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: P0 (2021)-2790 new order.exe PID: 6380, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6440, type: MEMORYSTR

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 2.2.MSBuild.exe.5cc0000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 2.2.MSBuild.exe.40d7a70.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 2.2.MSBuild.exe.40d7a70.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 2.2.MSBuild.exe.5cc0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 2.2.MSBuild.exe.30812fc.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 2.2.MSBuild.exe.5a20000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 2.2.MSBuild.exe.40dc099.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 2.2.MSBuild.exe.5cc4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000002.00000002.479823366.0000000000402000.00000040.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000002.00000002.479823366.0000000000402000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000002.00000002.485007729.0000000005A20000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.223144000.0000000002720000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.223144000.0000000002720000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000002.00000002.485086472.0000000005CC0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: P0 (2021)-2790 new order.exe PID: 6380, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: P0 (2021)-2790 new order.exe PID: 6380, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: MSBuild.exe PID: 6440, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: MSBuild.exe PID: 6440, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: P0 (2021)-2790 new order.exe
        Source: P0 (2021)-2790 new order.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 2.2.MSBuild.exe.5cc0000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 2.2.MSBuild.exe.5cc0000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 2.2.MSBuild.exe.40d7a70.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 2.2.MSBuild.exe.40d7a70.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 2.2.MSBuild.exe.40d7a70.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 2.2.MSBuild.exe.40d7a70.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 2.2.MSBuild.exe.5cc0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 2.2.MSBuild.exe.5cc0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 2.2.MSBuild.exe.30812fc.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 2.2.MSBuild.exe.30812fc.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 2.2.MSBuild.exe.5a20000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 2.2.MSBuild.exe.5a20000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 2.2.MSBuild.exe.40dc099.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 2.2.MSBuild.exe.40dc099.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 2.2.MSBuild.exe.5cc4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 2.2.MSBuild.exe.5cc4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000002.00000002.479823366.0000000000402000.00000040.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000002.00000002.479823366.0000000000402000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000002.00000002.485007729.0000000005A20000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000002.00000002.485007729.0000000005A20000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000002.223144000.0000000002720000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.223144000.0000000002720000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000002.223144000.0000000002720000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000002.00000002.485086472.0000000005CC0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000002.00000002.485086472.0000000005CC0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: Process Memory Space: P0 (2021)-2790 new order.exe PID: 6380, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: P0 (2021)-2790 new order.exe PID: 6380, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: MSBuild.exe PID: 6440, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: MSBuild.exe PID: 6440, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A3340B
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A42C51
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A431C3
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A47134
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A3C11C
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A3D292
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A426E6
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A45AC9
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A43EDF
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A3CA28
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A45207
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A3C610
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A3B26B
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A3CE5D
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_012D7ABE
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_02CDB2A8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_02CD2FA8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_02CD23A0
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_02CD3850
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_02CD89D8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_02CD969F
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_02CD306F
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_02CD95D8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 10_2_05781DF8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 10_2_05780708
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_00046D08
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_00046950
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_0004692F
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_047E0708
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_00F6692F
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_00F66950
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_00F66D08
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_052E180A NtQuerySystemInformation,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_052E17E8 NtQuerySystemInformation,
        Source: P0 (2021)-2790 new order.exe, 00000000.00000003.218277543.0000000002976000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs P0 (2021)-2790 new order.exe
        Source: dhcpmon.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: dhcpmon.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: dhcpmon.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: P0 (2021)-2790 new order.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\P0 (2021)-2790 new order.exe 'C:\Users\user\Desktop\P0 (2021)-2790 new order.exe'
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 'C:\Users\user\Desktop\P0 (2021)-2790 new order.exe'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7C69.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp8052.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 'C:\Users\user\Desktop\P0 (2021)-2790 new order.exe'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7C69.tmp'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp8052.tmp'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_052E149A AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_052E1463 AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9AJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7C69.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@16/11@0/1
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A31450 lstrlenW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,lstrlenW,StartServiceCtrlDispatcherW,GetLastError,GetProcessHeap,HeapFree,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A31450 lstrlenW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,lstrlenW,StartServiceCtrlDispatcherW,GetLastError,GetProcessHeap,HeapFree,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{6e073bd7-7c11-48c2-8a90-355dddea56c0}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7036:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6732:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6676:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6388:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6848:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6832:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: dhcpmon.exe, 0000000C.00000002.233299826.0000000000042000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.243062538.0000000000F62000.00000002.00020000.sdmp, dhcpmon.exe.2.drBinary or memory string: MSBuild MyApp.sln /t:Rebuild /p:Configuration=Release
        Source: dhcpmon.exe, 0000000C.00000002.233299826.0000000000042000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.243062538.0000000000F62000.00000002.00020000.sdmp, dhcpmon.exe.2.drBinary or memory string: MSBuild MyApp.csproj /t:Clean /p:Configuration=Debug
        Source: dhcpmon.exe, 0000000C.00000002.233299826.0000000000042000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.243062538.0000000000F62000.00000002.00020000.sdmp, dhcpmon.exe.2.drBinary or memory string: *.sln+AmbiguousProjectError'MissingProjectError)ProjectNotFoundError)InvalidPropertyError
        Source: dhcpmon.exeBinary or memory string: *.sln
        Source: dhcpmon.exe, 0000000F.00000002.247479470.0000000003671000.00000004.00000001.sdmpBinary or memory string: q*)C:\Program Files (x86)\DHCP Monitor\*.sln
        Source: 2.2.MSBuild.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 2.2.MSBuild.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 2.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: P0 (2021)-2790 new order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
        Source: P0 (2021)-2790 new order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
        Source: P0 (2021)-2790 new order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
        Source: P0 (2021)-2790 new order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: P0 (2021)-2790 new order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
        Source: P0 (2021)-2790 new order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
        Source: P0 (2021)-2790 new order.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: P0 (2021)-2790 new order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdbind source: MSBuild.exe, 00000002.00000002.482252225.0000000002CB5000.00000004.00000040.sdmp
        Source: Binary string: indows\MSBuild.pdbpdbild.p source: MSBuild.exe, 00000002.00000002.482252225.0000000002CB5000.00000004.00000040.sdmp
        Source: Binary string: wntdll.pdbUGP source: P0 (2021)-2790 new order.exe, 00000000.00000003.219629284.0000000002860000.00000004.00000001.sdmp
        Source: Binary string: wntdll.pdb source: P0 (2021)-2790 new order.exe, 00000000.00000003.219629284.0000000002860000.00000004.00000001.sdmp
        Source: Binary string: C:\Windows\System.pdb\W44FX source: MSBuild.exe, 00000002.00000002.482252225.0000000002CB5000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\dll\System.pdbSy source: MSBuild.exe, 00000002.00000002.482252225.0000000002CB5000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.pdb source: MSBuild.exe, 00000002.00000002.482252225.0000000002CB5000.00000004.00000040.sdmp
        Source: Binary string: indows\System.pdbpdbtem.pdb F source: MSBuild.exe, 00000002.00000002.482252225.0000000002CB5000.00000004.00000040.sdmp
        Source: Binary string: f:\dd\vsproject\xmake\XMakeCommandLine\objr\i386\MSBuild.pdb source: dhcpmon.exe, dhcpmon.exe.2.dr
        Source: Binary string: System.pdb source: MSBuild.exe, 00000002.00000002.482252225.0000000002CB5000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\symbols\dll\System.pdbse source: MSBuild.exe, 00000002.00000002.482252225.0000000002CB5000.00000004.00000040.sdmp
        Source: P0 (2021)-2790 new order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
        Source: P0 (2021)-2790 new order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
        Source: P0 (2021)-2790 new order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
        Source: P0 (2021)-2790 new order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
        Source: P0 (2021)-2790 new order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 2.2.MSBuild.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 2.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A34055 push ecx; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_012D74AC push ecx; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_012D74B8 push ebp; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_012D769D push es; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_012D9D78 pushad ; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_012D9D74 push eax; retf
        Source: 2.2.MSBuild.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 2.2.MSBuild.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7C69.tmp'
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A31450 lstrlenW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,lstrlenW,StartServiceCtrlDispatcherW,GetLastError,GetProcessHeap,HeapFree,

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A3340B RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 6772Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 6768Thread sleep time: -200000s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 6888Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6940Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 7088Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: foregroundWindowGot 897
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information queried: ProcessInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_052E11C2 GetSystemInfo,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A398C4 IsDebuggerPresent,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A36BA5 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A310B0 ExpandEnvironmentStringsW,GetLastError,GetProcessHeap,HeapAlloc,ExpandEnvironmentStringsW,GetLastError,GetProcessHeap,HeapFree,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess token adjusted: Debug
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMemory allocated: page read and write | page guard
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A348D3 SetUnhandledExceptionFilter,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A34904 SetUnhandledExceptionFilter,UnhandledExceptionFilter,

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Maps a DLL or memory area into another processShow sources
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe protection: execute and read and write
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 'C:\Users\user\Desktop\P0 (2021)-2790 new order.exe'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7C69.tmp'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp8052.tmp'
        Source: MSBuild.exe, 00000002.00000002.484445758.00000000032D9000.00000004.00000001.sdmpBinary or memory string: Program Manager(
        Source: MSBuild.exe, 00000002.00000002.484415620.00000000032C5000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: MSBuild.exe, 00000002.00000002.481714159.0000000001750000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
        Source: MSBuild.exe, 00000002.00000002.481714159.0000000001750000.00000002.00020000.sdmpBinary or memory string: Progman
        Source: MSBuild.exe, 00000002.00000002.481714159.0000000001750000.00000002.00020000.sdmpBinary or memory string: Progmanlock
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeA,_memmove,_memmove,_memmove,_free,_free,_free,_free,_free,_free,_free,_free,_free,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: EnumSystemLocalesW,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: GetLocaleInfoW,_GetPrimaryLen,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: EnumSystemLocalesW,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,_LcidFromHexString,GetLocaleInfoW,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,_free,_free,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,_free,_free,_free,_free,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: GetLocaleInfoW,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: _memset,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,___crtDownlevelLCIDToLocaleName,___crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s,
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A39BEE cpuid
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
        Source: C:\Users\user\Desktop\P0 (2021)-2790 new order.exeCode function: 0_2_00A33ECC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 2.2.MSBuild.exe.5cc0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.40d7a70.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.40d7a70.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.5cc0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.40dc099.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.5cc4629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000002.00000002.479823366.0000000000402000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.484597915.00000000040C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.223144000.0000000002720000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.485086472.0000000005CC0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: P0 (2021)-2790 new order.exe PID: 6380, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6440, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: P0 (2021)-2790 new order.exe, 00000000.00000002.223144000.0000000002720000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: MSBuild.exe, 00000002.00000002.479823366.0000000000402000.00000040.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: MSBuild.exe, 00000002.00000002.482557844.0000000003071000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 2.2.MSBuild.exe.5cc0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.40d7a70.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.40d7a70.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.5cc0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.P0 (2021)-2790 new order.exe.2720000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.40dc099.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.5cc4629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000002.00000002.479823366.0000000000402000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.484597915.00000000040C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.223144000.0000000002720000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.485086472.0000000005CC0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: P0 (2021)-2790 new order.exe PID: 6380, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6440, type: MEMORYSTR
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_052E292E bind,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 2_2_052E28FB bind,

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Windows Service3Access Token Manipulation1Masquerading2Input Capture21System Time Discovery1Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsService Execution2Scheduled Task/Job1Windows Service3Disable or Modify Tools1LSASS MemorySecurity Software Discovery3Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Application Shimming1Process Injection112Virtualization/Sandbox Evasion21Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Scheduled Task/Job1Access Token Manipulation1NTDSVirtualization/Sandbox Evasion21Distributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptApplication Shimming1Process Injection112LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Information Discovery34VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsHidden Files and Directories1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobObfuscated Files or Information1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing11/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 483496 Sample: P0 (2021)-2790 new order.exe Startdate: 15/09/2021 Architecture: WINDOWS Score: 100 46 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->46 48 Multi AV Scanner detection for domain / URL 2->48 50 Found malware configuration 2->50 52 7 other signatures 2->52 8 P0 (2021)-2790 new order.exe 1 2->8         started        11 dhcpmon.exe 5 2->11         started        13 dhcpmon.exe 6 2->13         started        15 MSBuild.exe 4 2->15         started        process3 signatures4 58 Maps a DLL or memory area into another process 8->58 17 MSBuild.exe 1 14 8->17         started        22 conhost.exe 8->22         started        24 conhost.exe 11->24         started        26 conhost.exe 13->26         started        28 conhost.exe 15->28         started        process5 dnsIp6 44 185.140.53.8, 49735, 49736, 49737 DAVID_CRAIGGG Sweden 17->44 38 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 17->38 dropped 40 C:\Users\user\AppData\Local\...\tmp7C69.tmp, XML 17->40 dropped 42 C:\Program Files (x86)\...\dhcpmon.exe, PE32 17->42 dropped 54 Uses schtasks.exe or at.exe to add and modify task schedules 17->54 56 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->56 30 schtasks.exe 1 17->30         started        32 schtasks.exe 1 17->32         started        file7 signatures8 process9 process10 34 conhost.exe 30->34         started        36 conhost.exe 32->36         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        No Antivirus matches

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe1%VirustotalBrowse
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        2.2.MSBuild.exe.5cc0000.6.unpack100%AviraTR/NanoCore.fadteDownload File
        2.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        0%Avira URL Cloudsafe
        185.140.53.811%VirustotalBrowse
        185.140.53.80%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        No contacted domains info

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        true
        • Avira URL Cloud: safe
        low
        185.140.53.8true
        • 11%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        185.140.53.8
        unknownSweden
        209623DAVID_CRAIGGGtrue

        General Information

        Joe Sandbox Version:33.0.0 White Diamond
        Analysis ID:483496
        Start date:15.09.2021
        Start time:06:12:21
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 8m 17s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:P0 (2021)-2790 new order.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:35
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@16/11@0/1
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 68% (good quality ratio 61.8%)
        • Quality average: 80.4%
        • Quality standard deviation: 31.6%
        HCA Information:
        • Successful, ratio: 96%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
        • TCP Packets have been reduced to 100
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 92.122.145.220, 23.35.236.56, 20.82.210.154, 40.112.88.60, 23.216.77.208, 23.216.77.209
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, store-images.s-microsoft.com-c.edgekey.net, e1723.g.akamaiedge.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, arc.trafficmanager.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net
        • Not all processes where analyzed, report is missing behavior information
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        06:13:22AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        06:13:24API Interceptor997x Sleep call for process: MSBuild.exe modified
        06:13:25Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe" s>$(Arg0)
        06:13:25Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        185.140.53.8l8Bg3M4Obd.exeGet hashmaliciousBrowse
          MANILA LGU VACCINATION.exeGet hashmaliciousBrowse
            Memorandum.pdf.exeGet hashmaliciousBrowse
              Scan copy ref PDF.exeGet hashmaliciousBrowse
                CV CREDENTIALS.exeGet hashmaliciousBrowse
                  WeASwOPOdNuVKbq.exeGet hashmaliciousBrowse
                    Purchase order.exeGet hashmaliciousBrowse
                      SWIFT GIHTLDOM00000003078.exeGet hashmaliciousBrowse

                        Domains

                        No context

                        ASN

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        DAVID_CRAIGGGHEIpSUdxRf.exeGet hashmaliciousBrowse
                        • 185.140.53.11
                        SPT DRINGENDE BESTELLUNG _876453,pdf.exeGet hashmaliciousBrowse
                        • 91.193.75.133
                        MAERSK ARRIVAL NOTICE.exeGet hashmaliciousBrowse
                        • 185.140.53.142
                        MHHHG_9847654673T3RDNVAASGU.NET.exeGet hashmaliciousBrowse
                        • 185.140.53.9
                        ordine 338390208,pdf.exeGet hashmaliciousBrowse
                        • 185.140.53.11
                        Final Order.exeGet hashmaliciousBrowse
                        • 185.140.53.133
                        SecuriteInfo.com.BackDoor.SpyBotNET.25.7070.exeGet hashmaliciousBrowse
                        • 185.140.53.9
                        yu8jcWMYUw.exeGet hashmaliciousBrowse
                        • 185.140.53.76
                        UK COVID UPDATES AND ENTITLEMENT.exeGet hashmaliciousBrowse
                        • 91.193.75.202
                        TWM#U007e-04987474848GRRT.exeGet hashmaliciousBrowse
                        • 185.140.53.9
                        BankSlip.exeGet hashmaliciousBrowse
                        • 185.140.53.226
                        Bank-Slip.exeGet hashmaliciousBrowse
                        • 185.140.53.226
                        HSBC -- Wire Transfer copy.exeGet hashmaliciousBrowse
                        • 91.193.75.173
                        lol.exeGet hashmaliciousBrowse
                        • 185.140.53.216
                        PO N. ordine 338390208B,pdf.exeGet hashmaliciousBrowse
                        • 185.140.53.11
                        Confirma#U00e7#U00e3o do pedido _ Urgente,pdf.exeGet hashmaliciousBrowse
                        • 91.193.75.133
                        Acil RFQ_AP65425652_032421.exeGet hashmaliciousBrowse
                        • 185.140.53.11
                        Auftragsbest#U00e4tigung _ Dringend,pdf.exeGet hashmaliciousBrowse
                        • 91.193.75.133
                        qkWaxZQ3dW.exeGet hashmaliciousBrowse
                        • 91.193.75.173
                        HPEE IMAGES-SPECIFICATION ORDER - Copy.xlsmGet hashmaliciousBrowse
                        • 91.193.75.173

                        JA3 Fingerprints

                        No context

                        Dropped Files

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeTNT AWB TRACKING DETAILS.exeGet hashmaliciousBrowse
                          BankSlip.exeGet hashmaliciousBrowse
                            PAYMENT ERROR.exeGet hashmaliciousBrowse
                              DHL AWB TRACKING DETAILS.exeGet hashmaliciousBrowse
                                DHL AWB TRACKING DETAILS.exeGet hashmaliciousBrowse
                                  PcgYFOwcNQ.exeGet hashmaliciousBrowse
                                    Invoice Fanpage Karma.bat.exeGet hashmaliciousBrowse
                                      zslaUKmBfr.exeGet hashmaliciousBrowse
                                        scanbankdoc210999796432225.bat.exeGet hashmaliciousBrowse
                                          SecuriteInfo.com.Variant.Zusy.394472.4088.exeGet hashmaliciousBrowse
                                            SecuriteInfo.com.W32.AIDetect.malware1.17748.exeGet hashmaliciousBrowse
                                              fnnEkbo4cW.exeGet hashmaliciousBrowse
                                                kAGA3XtSEaOxfvA.exeGet hashmaliciousBrowse
                                                  PO 18-3081.exeGet hashmaliciousBrowse
                                                    Order417.exeGet hashmaliciousBrowse
                                                      PCT0002982765627827BC.exeGet hashmaliciousBrowse
                                                        NO19800800.exeGet hashmaliciousBrowse
                                                          NAO09009009.exeGet hashmaliciousBrowse
                                                            SYT09009.exeGet hashmaliciousBrowse
                                                              RFQEMFA.Elektrik.exeGet hashmaliciousBrowse

                                                                Created / dropped Files

                                                                C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):69632
                                                                Entropy (8bit):5.20894581699571
                                                                Encrypted:false
                                                                SSDEEP:768:NElGiBcBuiyFjUwF0wdP9/rJMDnRFRJfStGpwV3e3qtAcy:ilGBu7jjP9/tMDn9Jt+VO3GO
                                                                MD5:88BBB7610152B48C2B3879473B17857E
                                                                SHA1:0F6CF8DD66AA58CE31DA4E8AC0631600EF055636
                                                                SHA-256:2C7ACC16D19D076D67E9F1F37984935899B79536C9AC6EEC8850C44D20F87616
                                                                SHA-512:5BACDF6C190A76C2C6A9A3519936E08E898AC8A2B1384D60429DF850BE778860435BF9E5EB316517D2345A5AAE201F369863F7A242134253978BCB5B2179CA58
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: Virustotal, Detection: 1%, Browse
                                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Joe Sandbox View:
                                                                • Filename: TNT AWB TRACKING DETAILS.exe, Detection: malicious, Browse
                                                                • Filename: BankSlip.exe, Detection: malicious, Browse
                                                                • Filename: PAYMENT ERROR.exe, Detection: malicious, Browse
                                                                • Filename: DHL AWB TRACKING DETAILS.exe, Detection: malicious, Browse
                                                                • Filename: DHL AWB TRACKING DETAILS.exe, Detection: malicious, Browse
                                                                • Filename: PcgYFOwcNQ.exe, Detection: malicious, Browse
                                                                • Filename: Invoice Fanpage Karma.bat.exe, Detection: malicious, Browse
                                                                • Filename: zslaUKmBfr.exe, Detection: malicious, Browse
                                                                • Filename: scanbankdoc210999796432225.bat.exe, Detection: malicious, Browse
                                                                • Filename: SecuriteInfo.com.Variant.Zusy.394472.4088.exe, Detection: malicious, Browse
                                                                • Filename: SecuriteInfo.com.W32.AIDetect.malware1.17748.exe, Detection: malicious, Browse
                                                                • Filename: fnnEkbo4cW.exe, Detection: malicious, Browse
                                                                • Filename: kAGA3XtSEaOxfvA.exe, Detection: malicious, Browse
                                                                • Filename: PO 18-3081.exe, Detection: malicious, Browse
                                                                • Filename: Order417.exe, Detection: malicious, Browse
                                                                • Filename: PCT0002982765627827BC.exe, Detection: malicious, Browse
                                                                • Filename: NO19800800.exe, Detection: malicious, Browse
                                                                • Filename: NAO09009009.exe, Detection: malicious, Browse
                                                                • Filename: SYT09009.exe, Detection: malicious, Browse
                                                                • Filename: RFQEMFA.Elektrik.exe, Detection: malicious, Browse
                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....{Z.....................@........... ........@.. .......................@......99....@.....................................S.......`/................... ....................................................... ............... ..H............text....... ...................... ..`.rsrc...`/.......0..................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\MSBuild.exe.log
                                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:modified
                                                                Size (bytes):325
                                                                Entropy (8bit):5.334380084018418
                                                                Encrypted:false
                                                                SSDEEP:6:Q3LadLCR22IAQykdL1tZbLsbFLIP12MUAvvro6ysGMFLIP12MUAvvrs:Q3LaJU20NaL1tZbgbe4MqJsGMe4M6
                                                                MD5:65CE98936A67552310EFE2F0FF5BDF88
                                                                SHA1:8133653A6B9A169C7496ADE315CED322CFC3613A
                                                                SHA-256:682F7C55B1B6E189D17755F74959CD08762F91373203B3B982ACFFCADE2E871A
                                                                SHA-512:2D00AC024267EC384720A400F6D0B4F7EDDF49FAF8AB3C9E6CBFBBAE90ECADACA9022B33E3E8EC92E4F57C7FC830299C8643235EB4AA7D8A6AFE9DD1775F57C3
                                                                Malicious:false
                                                                Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..2,"Microsoft.Build.Engine, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build.Framework, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:modified
                                                                Size (bytes):441
                                                                Entropy (8bit):5.388715099859351
                                                                Encrypted:false
                                                                SSDEEP:12:Q3LaJU20NaL10U2+gYhD5itZbgbe4MqJsGMe4M6:MLF20NaL32+g2OH4xvn4j
                                                                MD5:88F0104DB9A3F9BC4F0FC3805F571B0D
                                                                SHA1:CDD4F34385792F0CCE0A844F4ABB447C25AB4E73
                                                                SHA-256:F6C11D3D078ED73F2640DA510E68DEEAA5F14F79CAE2E23A254B4E37C7D0230F
                                                                SHA-512:04B977F63CAB8DE20EA7EFA9D4299C2E625D92FA6D54CA03EECD9F322E978326B353824F23BEC0E712083BDE0DBC5CC4EE90922137106B096050CA46A166DF0E
                                                                Malicious:false
                                                                Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\527c933194f3a99a816d83c619a3e1d3\System.Xml.ni.dll",0..2,"Microsoft.Build.Engine, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build.Framework, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                C:\Users\user\AppData\Local\Temp\tmp7C69.tmp
                                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1320
                                                                Entropy (8bit):5.136963558289723
                                                                Encrypted:false
                                                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mnc2xtn:cbk4oL600QydbQxIYODOLedq3ZLj
                                                                MD5:AE766004C0D8792953BAFFFE8F6A2E3B
                                                                SHA1:14B12F27543A401E2FE0AF8052E116CAB0032426
                                                                SHA-256:1ABDD9B6A6B84E4BA1AF1282DC84CE276C59BA253F4C4AF05FEA498A4FD99540
                                                                SHA-512:E530DA4A5D4336FC37838D0E93B5EB3804B9C489C71F6954A47FC81A4C655BB72EC493E109CF96E6E3617D7623AC80697AD3BBD5FFC6281BAFC8B34DCA5E6567
                                                                Malicious:true
                                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                C:\Users\user\AppData\Local\Temp\tmp8052.tmp
                                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1310
                                                                Entropy (8bit):5.109425792877704
                                                                Encrypted:false
                                                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                                MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                                SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                                SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                                SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                                Malicious:false
                                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):2320
                                                                Entropy (8bit):7.024371743172393
                                                                Encrypted:false
                                                                SSDEEP:48:Ik/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwh:flC0IlC0IlC0IlC0IlC0IlC0IlC0IlCr
                                                                MD5:0FBED11864C03FDED0E70014DCF84578
                                                                SHA1:453723D938A03252F705B0A104986FE4C5CA7056
                                                                SHA-256:70F5E49EE3091777827ED661B63842061220C899A708860986E9AA1BD87C5004
                                                                SHA-512:DB53E3F1D18171F1D86C1B9BBF6BBD07153FC3E561834A35834BC0CA1E034FEDCD83AAAE7EDF9262C4E175C3D2287B647F55282E49627EAAF587F43714204667
                                                                Malicious:false
                                                                Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                File Type:Non-ISO extended-ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):8
                                                                Entropy (8bit):3.0
                                                                Encrypted:false
                                                                SSDEEP:3:TIF8:i8
                                                                MD5:EFCA6CC477D60399732B834743979140
                                                                SHA1:FD4A75B0CFD84A9FE784E6C9E2ACD1A3CF235F52
                                                                SHA-256:3AE30778C66035457B34DF8B5A96CAE81968B115B46EC5CBFCE442235E0268DD
                                                                SHA-512:408636EFBD4BAA30CD78AD0F450ADD2D8937D6F0FDD49DA8D7F105279E148017F472371E954F3A0F9CCA59DB18EBBB82F1758F05E6312EFEAECA51212DEF6976
                                                                Malicious:true
                                                                Preview: M+..Jx.H
                                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):57
                                                                Entropy (8bit):4.85263908467479
                                                                Encrypted:false
                                                                SSDEEP:3:oMty8WbSI1u:oMLWuI1u
                                                                MD5:A35128E4E28B27328F70E4E8FF482443
                                                                SHA1:B89066B2F8DB34299AABFD7ABEE402D5444DD079
                                                                SHA-256:88AEA00733DC4B570A29D56A423CC5BF163E5ACE7AF349972EB0BBA8D9AD06E1
                                                                SHA-512:F098E844B5373B34642B49B6E0F2E15CFDAA1A8B6CABC2196CEC0F3765289E5B1FD4AB588DD65F97C8E51FA9A81077621E9A06946859F296904C646906A70F33
                                                                Malicious:false
                                                                Preview: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                \Device\ConDrv
                                                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):306
                                                                Entropy (8bit):4.969261552825097
                                                                Encrypted:false
                                                                SSDEEP:6:zx3M1tlAX8bSWR30qysGMQbSVRRZBXVRbJ0fFdCsq2UTiMdH8stCal+n:zK1XnV30ZsGMIG9BFRbQdCT2UftCM+
                                                                MD5:F227448515085A647910907084E6728E
                                                                SHA1:5FA1A8E28B084DA25A1BBC51A2D75810CEF57E2C
                                                                SHA-256:662BA47D628FE8EBE95DD47B4482110A10B49AED09387BC0E028BB66E68E20BD
                                                                SHA-512:6F6E5DFFF7B17C304FB19B0BA5466AF84EF98A5C2EFA573AF72CFD3ED6964E9FD7F8E4B79FCFFBEF87CE545418C69D4984F4DD60BBF457D0A3640950F8FC5AF0
                                                                Malicious:false
                                                                Preview: Microsoft (R) Build Engine Version 2.0.50727.8922..[Microsoft .NET Framework, Version 2.0.50727.8922]..Copyright (C) Microsoft Corporation 2005. All rights reserved.....MSBUILD : error MSB1003: Specify a project or solution file. The current working directory does not contain a project or solution file...

                                                                Static File Info

                                                                General

                                                                File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                Entropy (8bit):7.650091855564988
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:P0 (2021)-2790 new order.exe
                                                                File size:349184
                                                                MD5:394ff651c9fa2bfca16c32fb117514e1
                                                                SHA1:e9ae9e9c2985aaa1c96c7186f9147eebddb7b203
                                                                SHA256:25cc795662dc5f48d3e7dc1fcab5add2deed04887f7cfef18d1d4a3d7abf5ee7
                                                                SHA512:d2d78bbf59d3023e219f24f7291b68a7dae9fe414812debfcc669572c392e00b232b80e94ba90fad797ae98d7ac402301cb9f46143b0e618207faefd5a1457e1
                                                                SSDEEP:6144:tVQdPFh9YpnPSh80181yMJvS9Q4swk/qRdEt92V:c9T9W6h87P41kkdEzW
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u.....................................................................................Rich............................PE..L..

                                                                File Icon

                                                                Icon Hash:00828e8e8686b000

                                                                Static PE Info

                                                                General

                                                                Entrypoint:0x402abf
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows cui
                                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                Time Stamp:0x61411185 [Tue Sep 14 21:17:57 2021 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:6
                                                                OS Version Minor:0
                                                                File Version Major:6
                                                                File Version Minor:0
                                                                Subsystem Version Major:6
                                                                Subsystem Version Minor:0
                                                                Import Hash:337cc3ba01595b56bed66bb7d8f07a5a

                                                                Entrypoint Preview

                                                                Instruction
                                                                call 00007FE274D49C4Dh
                                                                jmp 00007FE274D4867Ah
                                                                push ebp
                                                                mov ebp, esp
                                                                mov eax, dword ptr [ebp+08h]
                                                                mov eax, dword ptr [eax]
                                                                cmp dword ptr [eax], E06D7363h
                                                                jne 00007FE274D48867h
                                                                cmp dword ptr [eax+10h], 03h
                                                                jne 00007FE274D48861h
                                                                mov eax, dword ptr [eax+14h]
                                                                cmp eax, 19930520h
                                                                je 00007FE274D4885Dh
                                                                cmp eax, 19930521h
                                                                je 00007FE274D48856h
                                                                cmp eax, 19930522h
                                                                je 00007FE274D4884Fh
                                                                cmp eax, 01994000h
                                                                je 00007FE274D48848h
                                                                xor eax, eax
                                                                pop ebp
                                                                retn 0004h
                                                                call 00007FE274D49FB8h
                                                                int3
                                                                push 00402AC9h
                                                                call 00007FE274D4A604h
                                                                pop ecx
                                                                xor eax, eax
                                                                ret
                                                                push ebp
                                                                mov ebp, esp
                                                                push esi
                                                                call 00007FE274D48B7Eh
                                                                mov esi, eax
                                                                test esi, esi
                                                                je 00007FE274D4898Bh
                                                                mov edx, dword ptr [esi+5Ch]
                                                                mov ecx, edx
                                                                push edi
                                                                mov edi, dword ptr [ebp+08h]
                                                                cmp dword ptr [ecx], edi
                                                                je 00007FE274D4884Fh
                                                                add ecx, 0Ch
                                                                lea eax, dword ptr [edx+00000090h]
                                                                cmp ecx, eax
                                                                jc 00007FE274D48831h
                                                                lea eax, dword ptr [edx+00000090h]
                                                                cmp ecx, eax
                                                                jnc 00007FE274D48846h
                                                                cmp dword ptr [ecx], edi
                                                                je 00007FE274D48844h
                                                                xor ecx, ecx
                                                                test ecx, ecx
                                                                je 00007FE274D48956h
                                                                mov edx, dword ptr [ecx+08h]
                                                                test edx, edx
                                                                je 00007FE274D4894Bh
                                                                cmp edx, 05h
                                                                jne 00007FE274D4884Eh
                                                                and dword ptr [ecx+08h], 00000000h
                                                                xor eax, eax
                                                                inc eax
                                                                jmp 00007FE274D4893Bh
                                                                cmp edx, 01h
                                                                jne 00007FE274D4884Ah
                                                                or eax, FFFFFFFFh
                                                                jmp 00007FE274D4892Eh

                                                                Rich Headers

                                                                Programming Language:
                                                                • [C++] VS2013 build 21005
                                                                • [ASM] VS2013 build 21005
                                                                • [ C ] VS2013 build 21005

                                                                Data Directories

                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x1e46c0xdc.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x240000x345e8.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x590000x13c8.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x1dd540x1c.rdata
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1dd700x40.rdata
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x190000x1fc.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                Sections

                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x17f490x18000False0.516937255859data6.60931791398IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                .rdata0x190000x60020x6200False0.370894451531data4.53614585813IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0x200000x31c40x1400False0.320703125data3.52089438859IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                .rsrc0x240000x345e80x34600False0.966983330847data7.99013268015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x590000x13c80x1400False0.81640625data6.61096020071IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                Resources

                                                                NameRVASizeTypeLanguageCountry
                                                                OZX0x240b00x343b6dataEnglishUnited States
                                                                RT_MANIFEST0x584680x17dXML 1.0 document textEnglishUnited States

                                                                Imports

                                                                DLLImport
                                                                IMM32.dllImmInstallIMEA, ImmDisableIME, ImmGetRegisterWordStyleW, ImmIsUIMessageA
                                                                KERNEL32.dllLoadLibraryExW, lstrcmpiW, lstrcpyW, lstrcatW, lstrlenW, CloseHandle, WriteConsoleW, SetFilePointerEx, SetStdHandle, GetConsoleMode, GetConsoleCP, FlushFileBuffers, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, FreeLibrary, GetTimeFormatW, VirtualProtect, GetDateFormatW, GetProcessHeap, HeapSize, GetStringTypeW, HeapReAlloc, OutputDebugStringW, RtlUnwind, SetConsoleCtrlHandler, IsProcessorFeaturePresent, IsDebuggerPresent, GetCPInfo, GetOEMCP, GetACP, IsValidCodePage, FatalAppExitA, LeaveCriticalSection, EnterCriticalSection, CreateSemaphoreW, GetModuleHandleW, GetTickCount, TlsFree, HeapFree, HeapAlloc, GetLastError, ExpandEnvironmentStringsW, GetProcAddress, CompareStringW, GetCommandLineW, SetLastError, GetCurrentThread, GetCurrentThreadId, EncodePointer, DecodePointer, ExitProcess, GetModuleHandleExW, AreFileApisANSI, MultiByteToWideChar, WideCharToMultiByte, GetStdHandle, GetFileType, DeleteCriticalSection, GetStartupInfoW, GetModuleFileNameW, WriteFile, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetEnvironmentStringsW, FreeEnvironmentStringsW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, InitializeCriticalSectionAndSpinCount, CreateEventW, Sleep, GetCurrentProcess, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, CreateFileW
                                                                RESUTILS.dllResUtilStopService, ResUtilGetPrivateProperties, ResUtilDupParameterBlock, ResUtilResourcesEqual, ResUtilGetProperty
                                                                loadperf.dllUnloadPerfCounterTextStringsW, LoadPerfCounterTextStringsA
                                                                MSVFW32.dllICGetDisplayFormat, DrawDibChangePalette, DrawDibClose
                                                                AVIFIL32.dllAVIFileEndRecord
                                                                WSOCK32.dllord1107, inet_ntoa, getservbyport, htons, getservbyname, WSASetBlockingHook
                                                                SETUPAPI.dllSetupInstallFileExA, SetupTerminateFileLog, SetupLogFileW, SetupOpenMasterInf, SetupInstallFileExW, SetupGetLineCountW, SetupDiGetHwProfileFriendlyNameExW
                                                                USER32.dllGrayStringA, MessageBoxW, GetDC
                                                                ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegQueryValueExA, StartServiceCtrlDispatcherW, RegQueryValueExW

                                                                Possible Origin

                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishUnited States

                                                                Network Behavior

                                                                Snort IDS Alerts

                                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                09/15/21-06:13:25.405871TCP2025019ET TROJAN Possible NanoCore C2 60B497358907192.168.2.3185.140.53.8
                                                                09/15/21-06:13:31.501018TCP2025019ET TROJAN Possible NanoCore C2 60B497368907192.168.2.3185.140.53.8
                                                                09/15/21-06:13:38.187895TCP2025019ET TROJAN Possible NanoCore C2 60B497378907192.168.2.3185.140.53.8
                                                                09/15/21-06:13:44.206046TCP2025019ET TROJAN Possible NanoCore C2 60B497428907192.168.2.3185.140.53.8
                                                                09/15/21-06:13:50.209237TCP2025019ET TROJAN Possible NanoCore C2 60B497458907192.168.2.3185.140.53.8
                                                                09/15/21-06:13:56.944143TCP2025019ET TROJAN Possible NanoCore C2 60B497468907192.168.2.3185.140.53.8
                                                                09/15/21-06:14:01.984974TCP2025019ET TROJAN Possible NanoCore C2 60B497478907192.168.2.3185.140.53.8
                                                                09/15/21-06:14:06.785682TCP2025019ET TROJAN Possible NanoCore C2 60B497548907192.168.2.3185.140.53.8
                                                                09/15/21-06:14:12.820795TCP2025019ET TROJAN Possible NanoCore C2 60B497748907192.168.2.3185.140.53.8
                                                                09/15/21-06:14:18.902806TCP2025019ET TROJAN Possible NanoCore C2 60B497758907192.168.2.3185.140.53.8
                                                                09/15/21-06:14:23.515493TCP2025019ET TROJAN Possible NanoCore C2 60B497798907192.168.2.3185.140.53.8
                                                                09/15/21-06:14:29.704539TCP2025019ET TROJAN Possible NanoCore C2 60B497868907192.168.2.3185.140.53.8
                                                                09/15/21-06:14:35.710881TCP2025019ET TROJAN Possible NanoCore C2 60B497878907192.168.2.3185.140.53.8
                                                                09/15/21-06:14:41.780948TCP2025019ET TROJAN Possible NanoCore C2 60B497888907192.168.2.3185.140.53.8
                                                                09/15/21-06:14:48.141045TCP2025019ET TROJAN Possible NanoCore C2 60B497898907192.168.2.3185.140.53.8
                                                                09/15/21-06:14:54.128708TCP2025019ET TROJAN Possible NanoCore C2 60B497908907192.168.2.3185.140.53.8
                                                                09/15/21-06:15:00.100074TCP2025019ET TROJAN Possible NanoCore C2 60B497958907192.168.2.3185.140.53.8
                                                                09/15/21-06:15:06.102195TCP2025019ET TROJAN Possible NanoCore C2 60B497968907192.168.2.3185.140.53.8
                                                                09/15/21-06:15:12.099261TCP2025019ET TROJAN Possible NanoCore C2 60B497978907192.168.2.3185.140.53.8
                                                                09/15/21-06:15:18.180591TCP2025019ET TROJAN Possible NanoCore C2 60B497988907192.168.2.3185.140.53.8
                                                                09/15/21-06:15:24.133637TCP2025019ET TROJAN Possible NanoCore C2 60B497998907192.168.2.3185.140.53.8

                                                                Network Port Distribution

                                                                TCP Packets

                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Sep 15, 2021 06:13:16.873142004 CEST49686443192.168.2.3204.79.197.200
                                                                Sep 15, 2021 06:13:16.873223066 CEST49686443192.168.2.3204.79.197.200
                                                                Sep 15, 2021 06:13:16.873270988 CEST49686443192.168.2.3204.79.197.200
                                                                Sep 15, 2021 06:13:16.873308897 CEST49686443192.168.2.3204.79.197.200
                                                                Sep 15, 2021 06:13:16.873359919 CEST49686443192.168.2.3204.79.197.200
                                                                Sep 15, 2021 06:13:16.873398066 CEST49686443192.168.2.3204.79.197.200
                                                                Sep 15, 2021 06:13:16.873409986 CEST49686443192.168.2.3204.79.197.200
                                                                Sep 15, 2021 06:13:16.873435020 CEST49686443192.168.2.3204.79.197.200
                                                                Sep 15, 2021 06:13:16.873457909 CEST49686443192.168.2.3204.79.197.200
                                                                Sep 15, 2021 06:13:16.873471022 CEST49686443192.168.2.3204.79.197.200
                                                                Sep 15, 2021 06:13:16.890158892 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.890197992 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.890346050 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.890383005 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.890409946 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.890435934 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.890460014 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.890621901 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.890652895 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.890678883 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.890703917 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.890728951 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.890753031 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.890808105 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.890837908 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891010046 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891036987 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891081095 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891105890 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891177893 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891210079 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891233921 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891258955 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891283989 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891366005 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891402006 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891441107 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891475916 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891511917 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891540051 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891583920 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891608000 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891633034 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891711950 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891758919 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891803026 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891828060 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891854048 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891877890 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891915083 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891948938 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891973972 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.891999960 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892015934 CEST49686443192.168.2.3204.79.197.200
                                                                Sep 15, 2021 06:13:16.892182112 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892219067 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892251968 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892286062 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892322063 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892364979 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892402887 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892441034 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892477989 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892515898 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892553091 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892590046 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892627001 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892633915 CEST49686443192.168.2.3204.79.197.200
                                                                Sep 15, 2021 06:13:16.892668009 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892698050 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892721891 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892748117 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892772913 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892937899 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.892976999 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.893004894 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.893028021 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.893054008 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.893079042 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.893120050 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.893160105 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.893196106 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.893234015 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:16.893261909 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:17.122844934 CEST44349686204.79.197.200192.168.2.3
                                                                Sep 15, 2021 06:13:17.122977018 CEST49686443192.168.2.3204.79.197.200
                                                                Sep 15, 2021 06:13:25.199580908 CEST497358907192.168.2.3185.140.53.8
                                                                Sep 15, 2021 06:13:25.375214100 CEST890749735185.140.53.8192.168.2.3
                                                                Sep 15, 2021 06:13:25.375374079 CEST497358907192.168.2.3185.140.53.8
                                                                Sep 15, 2021 06:13:25.405870914 CEST497358907192.168.2.3185.140.53.8
                                                                Sep 15, 2021 06:13:25.707206011 CEST890749735185.140.53.8192.168.2.3
                                                                Sep 15, 2021 06:13:25.707415104 CEST497358907192.168.2.3185.140.53.8
                                                                Sep 15, 2021 06:13:26.107563019 CEST890749735185.140.53.8192.168.2.3
                                                                Sep 15, 2021 06:13:26.107681036 CEST497358907192.168.2.3185.140.53.8
                                                                Sep 15, 2021 06:13:26.628405094 CEST497358907192.168.2.3185.140.53.8
                                                                Sep 15, 2021 06:13:26.819199085 CEST890749735185.140.53.8192.168.2.3
                                                                Sep 15, 2021 06:13:27.254935980 CEST497358907192.168.2.3185.140.53.8
                                                                Sep 15, 2021 06:13:27.432110071 CEST890749735185.140.53.8192.168.2.3
                                                                Sep 15, 2021 06:13:27.432234049 CEST497358907192.168.2.3185.140.53.8
                                                                Sep 15, 2021 06:13:31.297956944 CEST497368907192.168.2.3185.140.53.8

                                                                UDP Packets

                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Sep 15, 2021 06:13:14.766994953 CEST4919953192.168.2.38.8.8.8
                                                                Sep 15, 2021 06:13:14.796416998 CEST53491998.8.8.8192.168.2.3
                                                                Sep 15, 2021 06:13:41.778148890 CEST5062053192.168.2.38.8.8.8
                                                                Sep 15, 2021 06:13:41.815077066 CEST53506208.8.8.8192.168.2.3
                                                                Sep 15, 2021 06:13:45.752944946 CEST6493853192.168.2.38.8.8.8
                                                                Sep 15, 2021 06:13:45.786088943 CEST53649388.8.8.8192.168.2.3
                                                                Sep 15, 2021 06:14:05.316644907 CEST6015253192.168.2.38.8.8.8
                                                                Sep 15, 2021 06:14:05.360161066 CEST53601528.8.8.8192.168.2.3
                                                                Sep 15, 2021 06:14:20.634927034 CEST5754453192.168.2.38.8.8.8
                                                                Sep 15, 2021 06:14:20.683238983 CEST53575448.8.8.8192.168.2.3
                                                                Sep 15, 2021 06:14:23.132409096 CEST5598453192.168.2.38.8.8.8
                                                                Sep 15, 2021 06:14:23.161971092 CEST53559848.8.8.8192.168.2.3
                                                                Sep 15, 2021 06:14:57.416039944 CEST6418553192.168.2.38.8.8.8
                                                                Sep 15, 2021 06:14:57.450490952 CEST53641858.8.8.8192.168.2.3
                                                                Sep 15, 2021 06:14:58.750438929 CEST6511053192.168.2.38.8.8.8
                                                                Sep 15, 2021 06:14:58.792069912 CEST53651108.8.8.8192.168.2.3

                                                                Code Manipulations

                                                                Statistics

                                                                Behavior

                                                                Click to jump to process

                                                                System Behavior

                                                                General

                                                                Start time:06:13:17
                                                                Start date:15/09/2021
                                                                Path:C:\Users\user\Desktop\P0 (2021)-2790 new order.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Users\user\Desktop\P0 (2021)-2790 new order.exe'
                                                                Imagebase:0xa30000
                                                                File size:349184 bytes
                                                                MD5 hash:394FF651C9FA2BFCA16C32FB117514E1
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.223144000.0000000002720000.00000004.00000001.sdmp, Author: Florian Roth
                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.223144000.0000000002720000.00000004.00000001.sdmp, Author: Florian Roth
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.223144000.0000000002720000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.223144000.0000000002720000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                Reputation:low

                                                                General

                                                                Start time:06:13:18
                                                                Start date:15/09/2021
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff6b2800000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:06:13:18
                                                                Start date:15/09/2021
                                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Users\user\Desktop\P0 (2021)-2790 new order.exe'
                                                                Imagebase:0x9e0000
                                                                File size:69632 bytes
                                                                MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.479823366.0000000000402000.00000040.00020000.sdmp, Author: Florian Roth
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.479823366.0000000000402000.00000040.00020000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.479823366.0000000000402000.00000040.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.484597915.00000000040C9000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.485007729.0000000005A20000.00000004.00020000.sdmp, Author: Florian Roth
                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.485007729.0000000005A20000.00000004.00020000.sdmp, Author: Florian Roth
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.485086472.0000000005CC0000.00000004.00020000.sdmp, Author: Florian Roth
                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.485086472.0000000005CC0000.00000004.00020000.sdmp, Author: Florian Roth
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.485086472.0000000005CC0000.00000004.00020000.sdmp, Author: Joe Security
                                                                Reputation:moderate

                                                                General

                                                                Start time:06:13:22
                                                                Start date:15/09/2021
                                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7C69.tmp'
                                                                Imagebase:0x940000
                                                                File size:185856 bytes
                                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:06:13:22
                                                                Start date:15/09/2021
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff6b2800000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:06:13:23
                                                                Start date:15/09/2021
                                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp8052.tmp'
                                                                Imagebase:0x940000
                                                                File size:185856 bytes
                                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:06:13:23
                                                                Start date:15/09/2021
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff6b2800000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:06:13:25
                                                                Start date:15/09/2021
                                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0
                                                                Imagebase:0xfb0000
                                                                File size:69632 bytes
                                                                MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Reputation:moderate

                                                                General

                                                                Start time:06:13:25
                                                                Start date:15/09/2021
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff6b2800000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:06:13:25
                                                                Start date:15/09/2021
                                                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                                Imagebase:0x40000
                                                                File size:69632 bytes
                                                                MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Antivirus matches:
                                                                • Detection: 1%, Virustotal, Browse
                                                                • Detection: 0%, Metadefender, Browse
                                                                • Detection: 0%, ReversingLabs
                                                                Reputation:moderate

                                                                General

                                                                Start time:06:13:26
                                                                Start date:15/09/2021
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff6b2800000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:06:13:31
                                                                Start date:15/09/2021
                                                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                Imagebase:0xf60000
                                                                File size:69632 bytes
                                                                MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Reputation:moderate

                                                                General

                                                                Start time:06:13:31
                                                                Start date:15/09/2021
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff6b2800000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                Disassembly

                                                                Code Analysis

                                                                Reset < >