Loading ...

Play interactive tourEdit tour

Windows Analysis Report ALP.exe

Overview

General Information

Sample Name:ALP.exe
Analysis ID:483771
MD5:60e9f1e8596c98a6b07129d9c24ec359
SHA1:0e9e28f2853681a41a9ace446c0597320452bd9d
SHA256:658e8d30979add1dfcccd8adba33c136541fe1c9d24bfdeb3fadc5a5a5252716
Tags:exe
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large strings
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • ALP.exe (PID: 6264 cmdline: 'C:\Users\user\Desktop\ALP.exe' MD5: 60E9F1E8596C98A6B07129D9C24EC359)
    • ALP.exe (PID: 6484 cmdline: C:\Users\user\Desktop\ALP.exe MD5: 60E9F1E8596C98A6B07129D9C24EC359)
      • schtasks.exe (PID: 6548 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp1584.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6572 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6616 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp196D.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • ALP.exe (PID: 6640 cmdline: C:\Users\user\Desktop\ALP.exe 0 MD5: 60E9F1E8596C98A6B07129D9C24EC359)
    • ALP.exe (PID: 6840 cmdline: C:\Users\user\Desktop\ALP.exe MD5: 60E9F1E8596C98A6B07129D9C24EC359)
  • dhcpmon.exe (PID: 6800 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 60E9F1E8596C98A6B07129D9C24EC359)
    • dhcpmon.exe (PID: 5640 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 60E9F1E8596C98A6B07129D9C24EC359)
  • dhcpmon.exe (PID: 6896 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 60E9F1E8596C98A6B07129D9C24EC359)
    • dhcpmon.exe (PID: 4448 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 60E9F1E8596C98A6B07129D9C24EC359)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000011.00000002.303142611.00000000043C9000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000011.00000002.303142611.00000000043C9000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x4358d:$a: NanoCore
    • 0x435e6:$a: NanoCore
    • 0x43623:$a: NanoCore
    • 0x4369c:$a: NanoCore
    • 0x56d47:$a: NanoCore
    • 0x56d5c:$a: NanoCore
    • 0x56d91:$a: NanoCore
    • 0x6fd23:$a: NanoCore
    • 0x6fd38:$a: NanoCore
    • 0x6fd6d:$a: NanoCore
    • 0x435ef:$b: ClientPlugin
    • 0x4362c:$b: ClientPlugin
    • 0x43f2a:$b: ClientPlugin
    • 0x43f37:$b: ClientPlugin
    • 0x56b03:$b: ClientPlugin
    • 0x56b1e:$b: ClientPlugin
    • 0x56b4e:$b: ClientPlugin
    • 0x56d65:$b: ClientPlugin
    • 0x56d9a:$b: ClientPlugin
    • 0x6fadf:$b: ClientPlugin
    • 0x6fafa:$b: ClientPlugin
    0000000F.00000002.290814586.00000000041F9000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000000F.00000002.290814586.00000000041F9000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x4358d:$a: NanoCore
      • 0x435e6:$a: NanoCore
      • 0x43623:$a: NanoCore
      • 0x4369c:$a: NanoCore
      • 0x56d47:$a: NanoCore
      • 0x56d5c:$a: NanoCore
      • 0x56d91:$a: NanoCore
      • 0x6fd23:$a: NanoCore
      • 0x6fd38:$a: NanoCore
      • 0x6fd6d:$a: NanoCore
      • 0x435ef:$b: ClientPlugin
      • 0x4362c:$b: ClientPlugin
      • 0x43f2a:$b: ClientPlugin
      • 0x43f37:$b: ClientPlugin
      • 0x56b03:$b: ClientPlugin
      • 0x56b1e:$b: ClientPlugin
      • 0x56b4e:$b: ClientPlugin
      • 0x56d65:$b: ClientPlugin
      • 0x56d9a:$b: ClientPlugin
      • 0x6fadf:$b: ClientPlugin
      • 0x6fafa:$b: ClientPlugin
      0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xa02b5:$x1: NanoCore.ClientPluginHost
      • 0xd2cd5:$x1: NanoCore.ClientPluginHost
      • 0xa02f2:$x2: IClientNetworkHost
      • 0xd2d12:$x2: IClientNetworkHost
      • 0xa3e25:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      • 0xd6845:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 39 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      12.2.ALP.exe.2a4949c.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      12.2.ALP.exe.2a4949c.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      12.2.ALP.exe.3a2b7ae.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0x145e3:$x1: NanoCore.ClientPluginHost
      • 0x2d5bf:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      • 0x14610:$x2: IClientNetworkHost
      • 0x2d5ec:$x2: IClientNetworkHost
      12.2.ALP.exe.3a2b7ae.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x145e3:$x2: NanoCore.ClientPluginHost
      • 0x2d5bf:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0x156be:$s4: PipeCreated
      • 0x2e69a:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      • 0x145fd:$s5: IClientLoggingHost
      • 0x2d5d9:$s5: IClientLoggingHost
      12.2.ALP.exe.3a2b7ae.5.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 42 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ALP.exe, ProcessId: 6484, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ALP.exe, ProcessId: 6484, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ALP.exe, ProcessId: 6484, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ALP.exe, ProcessId: 6484, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Multi AV Scanner detection for submitted fileShow sources
        Source: ALP.exeVirustotal: Detection: 34%Perma Link
        Source: ALP.exeReversingLabs: Detection: 30%
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 30%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.ALP.exe.35a9128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.3599128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a305e4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a305e4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a34c0d.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3db9128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ALP.exe.4439128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000011.00000002.303142611.00000000043C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.290814586.00000000041F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.296217423.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.288869648.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.302815606.00000000033C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.290681515.00000000031F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ALP.exe PID: 6840, type: MEMORYSTR
        Machine Learning detection for sampleShow sources
        Source: ALP.exeJoe Sandbox ML: detected
        Machine Learning detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Source: 12.2.ALP.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: ALP.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: ALP.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Networking:

        barindex
        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49737 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49738 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49743 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49746 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49747 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49748 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49758 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49777 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49786 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49787 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49788 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49789 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49790 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49795 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49796 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49797 -> 185.174.101.21:7712
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49798 -> 185.174.101.21:7712
        Source: global trafficTCP traffic: 192.168.2.3:49737 -> 185.174.101.21:7712
        Source: unknownDNS traffic detected: queries for: godisgood1.hopto.org
        Source: ALP.exe, 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.ALP.exe.35a9128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.3599128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a305e4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a305e4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a34c0d.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3db9128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ALP.exe.4439128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000011.00000002.303142611.00000000043C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.290814586.00000000041F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.296217423.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.288869648.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.302815606.00000000033C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.290681515.00000000031F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ALP.exe PID: 6840, type: MEMORYSTR

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 12.2.ALP.exe.2a4949c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 9.2.ALP.exe.35a9128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 9.2.ALP.exe.35a9128.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.dhcpmon.exe.3599128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.dhcpmon.exe.3599128.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.ALP.exe.3a305e4.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.ALP.exe.3a305e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.ALP.exe.3a34c0d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 13.2.dhcpmon.exe.3db9128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.dhcpmon.exe.3db9128.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.ALP.exe.4439128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.ALP.exe.4439128.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000011.00000002.303142611.00000000043C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.290814586.00000000041F9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000011.00000002.296217423.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000011.00000002.296217423.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.288869648.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000F.00000002.288869648.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000011.00000002.302815606.00000000033C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.290681515.00000000031F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: ALP.exe PID: 6840, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: ALP.exe PID: 6840, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        .NET source code contains very large stringsShow sources
        Source: ALP.exe, Forms/mainForm.csLong String: Length: 38272
        Source: 0.0.ALP.exe.fd0000.0.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: 0.2.ALP.exe.fd0000.0.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: dhcpmon.exe.4.dr, Forms/mainForm.csLong String: Length: 38272
        Source: 4.0.ALP.exe.770000.0.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: 9.0.ALP.exe.190000.0.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: 9.2.ALP.exe.190000.0.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: 11.0.dhcpmon.exe.150000.0.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: 11.2.dhcpmon.exe.150000.0.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: 12.2.ALP.exe.5e0000.1.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: 12.0.ALP.exe.5e0000.0.unpack, Forms/mainForm.csLong String: Length: 38272
        Source: ALP.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 12.2.ALP.exe.2a4949c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.ALP.exe.2a4949c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 9.2.ALP.exe.35a9128.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 9.2.ALP.exe.35a9128.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.dhcpmon.exe.3599128.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.dhcpmon.exe.3599128.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.ALP.exe.3a305e4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.ALP.exe.3a305e4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.ALP.exe.3a305e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.ALP.exe.3a305e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.ALP.exe.3a34c0d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.ALP.exe.3a34c0d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 13.2.dhcpmon.exe.3db9128.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.dhcpmon.exe.3db9128.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.ALP.exe.4439128.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.ALP.exe.4439128.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000011.00000002.303142611.00000000043C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.290814586.00000000041F9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000011.00000002.296217423.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000011.00000002.296217423.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.288869648.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000F.00000002.288869648.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000011.00000002.302815606.00000000033C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.290681515.00000000031F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: ALP.exe PID: 6840, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: ALP.exe PID: 6840, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D3178
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D6198
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D3168
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D340B
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D339E
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D3392
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D33BD
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D2E58
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D0650
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D2E68
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_0336C124
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_0336E570
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_0336E561
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_022FC124
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_022FE562
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_022FE570
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_04513178
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_0451340B
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_04513172
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_04516198
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_04513392
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_0451339E
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_045133BD
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_04512E58
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_04512E68
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_00B8C124
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_00B8E570
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_00B8E562
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_04503178
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_0450340B
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_04502E58
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_04502E68
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_04503173
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_04506198
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_04503392
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_0450339E
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_045033BD
        Source: C:\Users\user\Desktop\ALP.exeCode function: 12_2_00EAE480
        Source: C:\Users\user\Desktop\ALP.exeCode function: 12_2_00EAE471
        Source: C:\Users\user\Desktop\ALP.exeCode function: 12_2_00EABBD4
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_02B7C124
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_02B7E570
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_02B7E561
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D26198
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D23178
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D2340B
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D20650
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D22E58
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D22E68
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D2316A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D23392
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D2339E
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D233BD
        Source: ALP.exe, 00000000.00000002.239605838.0000000006540000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameCF_Secretaria.dll< vs ALP.exe
        Source: ALP.exe, 00000000.00000002.235666241.00000000033B7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameEnvoySinks.dll6 vs ALP.exe
        Source: ALP.exe, 00000000.00000002.234119397.0000000001066000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCurrencyWrapp.exe4 vs ALP.exe
        Source: ALP.exe, 00000004.00000000.232573322.0000000000806000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCurrencyWrapp.exe4 vs ALP.exe
        Source: ALP.exe, 00000004.00000003.249895451.00000000064DE000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs ALP.exe
        Source: ALP.exe, 00000009.00000002.252404689.0000000000226000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCurrencyWrapp.exe4 vs ALP.exe
        Source: ALP.exe, 00000009.00000002.263876804.0000000002527000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameEnvoySinks.dll6 vs ALP.exe
        Source: ALP.exe, 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs ALP.exe
        Source: ALP.exe, 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs ALP.exe
        Source: ALP.exe, 0000000C.00000000.250850600.0000000000676000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCurrencyWrapp.exe4 vs ALP.exe
        Source: ALP.exe, 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs ALP.exe
        Source: ALP.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: dhcpmon.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: ALP.exeVirustotal: Detection: 34%
        Source: ALP.exeReversingLabs: Detection: 30%
        Source: C:\Users\user\Desktop\ALP.exeFile read: C:\Users\user\Desktop\ALP.exeJump to behavior
        Source: ALP.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\ALP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\ALP.exe 'C:\Users\user\Desktop\ALP.exe'
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Users\user\Desktop\ALP.exe C:\Users\user\Desktop\ALP.exe
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp1584.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp196D.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\ALP.exe C:\Users\user\Desktop\ALP.exe 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Users\user\Desktop\ALP.exe C:\Users\user\Desktop\ALP.exe
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Users\user\Desktop\ALP.exe C:\Users\user\Desktop\ALP.exe
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp1584.tmp'
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp196D.tmp'
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Users\user\Desktop\ALP.exe C:\Users\user\Desktop\ALP.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\ALP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
        Source: C:\Users\user\Desktop\ALP.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ALP.exe.logJump to behavior
        Source: C:\Users\user\Desktop\ALP.exeFile created: C:\Users\user\AppData\Local\Temp\tmp1584.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@18/11@17/1
        Source: C:\Users\user\Desktop\ALP.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\ALP.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\ALP.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\ALP.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6572:120:WilError_01
        Source: C:\Users\user\Desktop\ALP.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{9ed8d108-2eb1-4e23-9679-783796e4baff}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6632:120:WilError_01
        Source: C:\Users\user\Desktop\ALP.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: ALP.exe, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 0.0.ALP.exe.fd0000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 0.2.ALP.exe.fd0000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: dhcpmon.exe.4.dr, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 4.0.ALP.exe.770000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 9.0.ALP.exe.190000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\ALP.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: ALP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: ALP.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: ALP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: ALP.exe, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.ALP.exe.fd0000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.ALP.exe.fd0000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: dhcpmon.exe.4.dr, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.0.ALP.exe.770000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 9.0.ALP.exe.190000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 9.2.ALP.exe.190000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.0.dhcpmon.exe.150000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.2.dhcpmon.exe.150000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 12.2.ALP.exe.5e0000.1.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 12.0.ALP.exe.5e0000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D11D8 push ds; ret
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D4001 push ecx; retf
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_019D3FFC push ecx; retf
        Source: C:\Users\user\Desktop\ALP.exeCode function: 0_2_0336F933 push esp; iretd
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_04514001 push ecx; retf
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_045111D8 push ds; ret
        Source: C:\Users\user\Desktop\ALP.exeCode function: 9_2_04513FFC push ecx; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_04503FFC push ecx; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_04504001 push ecx; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_045011D8 push ds; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D23FFC push ecx; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D24001 push ecx; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_04D211D8 push ds; ret
        Source: ALP.exeStatic PE information: 0x8C4B6098 [Tue Aug 2 11:29:28 2044 UTC]
        Source: initial sampleStatic PE information: section name: .text entropy: 7.26903403564
        Source: initial sampleStatic PE information: section name: .text entropy: 7.26903403564
        Source: C:\Users\user\Desktop\ALP.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp1584.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\ALP.exeFile opened: C:\Users\user\Desktop\ALP.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\ALP.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ALP.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: 00000000.00000002.235658779.00000000033B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.263837733.0000000002521000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.274932802.0000000002512000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ALP.exe PID: 6264, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: ALP.exe PID: 6640, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6800, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6896, type: MEMORYSTR
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: ALP.exe, 00000000.00000002.235658779.00000000033B1000.00000004.00000001.sdmp, ALP.exe, 00000009.00000002.263837733.0000000002521000.00000004.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.274932802.0000000002512000.00000004.00000001.sdmp, dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: ALP.exe, 00000000.00000002.235658779.00000000033B1000.00000004.00000001.sdmp, ALP.exe, 00000009.00000002.263837733.0000000002521000.00000004.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.274932802.0000000002512000.00000004.00000001.sdmp, dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\ALP.exe TID: 6268Thread sleep time: -35752s >= -30000s
        Source: C:\Users\user\Desktop\ALP.exe TID: 6320Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\ALP.exe TID: 6724Thread sleep time: -14757395258967632s >= -30000s
        Source: C:\Users\user\Desktop\ALP.exe TID: 6644Thread sleep time: -34772s >= -30000s
        Source: C:\Users\user\Desktop\ALP.exe TID: 6720Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6804Thread sleep time: -43449s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6832Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\ALP.exe TID: 6864Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6900Thread sleep time: -41618s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 7140Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\ALP.exeWindow / User API: threadDelayed 2780
        Source: C:\Users\user\Desktop\ALP.exeWindow / User API: threadDelayed 6488
        Source: C:\Users\user\Desktop\ALP.exeWindow / User API: foregroundWindowGot 616
        Source: C:\Users\user\Desktop\ALP.exeWindow / User API: foregroundWindowGot 725
        Source: C:\Users\user\Desktop\ALP.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 35752
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 34772
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 43449
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\ALP.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41618
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: dhcpmon.exe, 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: C:\Users\user\Desktop\ALP.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\ALP.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\ALP.exeMemory written: C:\Users\user\Desktop\ALP.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\ALP.exeMemory written: C:\Users\user\Desktop\ALP.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Users\user\Desktop\ALP.exe C:\Users\user\Desktop\ALP.exe
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp1584.tmp'
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp196D.tmp'
        Source: C:\Users\user\Desktop\ALP.exeProcess created: C:\Users\user\Desktop\ALP.exe C:\Users\user\Desktop\ALP.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Users\user\Desktop\ALP.exe VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Users\user\Desktop\ALP.exe VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Users\user\Desktop\ALP.exe VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Users\user\Desktop\ALP.exe VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\ALP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\ALP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.ALP.exe.35a9128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.3599128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a305e4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a305e4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a34c0d.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3db9128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ALP.exe.4439128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000011.00000002.303142611.00000000043C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.290814586.00000000041F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.296217423.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.288869648.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.302815606.00000000033C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.290681515.00000000031F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ALP.exe PID: 6840, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: ALP.exe, 00000004.00000003.249895451.00000000064DE000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: ALP.exe, 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: ALP.exe, 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 12.2.ALP.exe.3a2b7ae.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3db9128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.3599128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ALP.exe.4439128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.ALP.exe.35a9128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.3599128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a305e4.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a305e4.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.ALP.exe.3a34c0d.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.ALP.exe.35a9128.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3db9128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ALP.exe.4439128.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000011.00000002.303142611.00000000043C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.290814586.00000000041F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.296217423.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.288869648.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.302815606.00000000033C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.290681515.00000000031F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ALP.exe PID: 6840, type: MEMORYSTR

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Process Injection111Masquerading2Input Capture11Query Registry1Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemorySecurity Software Discovery211Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection111NTDSVirtualization/Sandbox Evasion21Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol1Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Timestomp1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 483771 Sample: ALP.exe Startdate: 15/09/2021 Architecture: WINDOWS Score: 100 45 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 Multi AV Scanner detection for dropped file 2->49 51 10 other signatures 2->51 8 ALP.exe 3 2->8         started        12 ALP.exe 2 2->12         started        14 dhcpmon.exe 3 2->14         started        16 dhcpmon.exe 2 2->16         started        process3 file4 41 C:\Users\user\AppData\Local\...\ALP.exe.log, ASCII 8->41 dropped 55 Uses schtasks.exe or at.exe to add and modify task schedules 8->55 57 Injects a PE file into a foreign processes 8->57 18 ALP.exe 1 15 8->18         started        23 ALP.exe 2 12->23         started        signatures5 process6 dnsIp7 43 godisgood1.hopto.org 185.174.101.21, 49737, 49738, 49743 ASN-QUADRANET-GLOBALUS Ukraine 18->43 33 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->33 dropped 35 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 18->35 dropped 37 C:\Users\user\AppData\Local\...\tmp1584.tmp, XML 18->37 dropped 39 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->39 dropped 53 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->53 25 schtasks.exe 1 18->25         started        27 schtasks.exe 1 18->27         started        file8 signatures9 process10 process11 29 conhost.exe 25->29         started        31 conhost.exe 27->31         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        ALP.exe34%VirustotalBrowse
        ALP.exe30%ReversingLabs
        ALP.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe30%ReversingLabs

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        12.2.ALP.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        No Antivirus matches

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        godisgood1.hopto.org
        185.174.101.21
        truefalse
          high

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          185.174.101.21
          godisgood1.hopto.orgUkraine
          8100ASN-QUADRANET-GLOBALUSfalse

          General Information

          Joe Sandbox Version:33.0.0 White Diamond
          Analysis ID:483771
          Start date:15.09.2021
          Start time:13:21:04
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 14m 4s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:ALP.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:35
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@18/11@17/1
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 0.2% (good quality ratio 0.2%)
          • Quality average: 81.1%
          • Quality standard deviation: 5.2%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          Warnings:
          Show All
          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
          • TCP Packets have been reduced to 100
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 184.30.21.144, 23.35.236.56, 20.50.102.62, 40.112.88.60, 23.203.67.116, 23.203.69.124, 23.216.77.208, 23.216.77.209, 20.82.209.183
          • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, tile-service.weather.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, e15275.g.akamaiedge.net, a1449.dscg2.akamai.net, arc.msn.com, cdn.onenote.net.edgekey.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, wildcard.weather.microsoft.com.edgekey.net, arc.trafficmanager.net, e1553.dspg.akamaiedge.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, cdn.onenote.net
          • Not all processes where analyzed, report is missing behavior information
          • Report creation exceeded maximum time and may have missing behavior and disassembly information.
          • Report creation exceeded maximum time and may have missing disassembly code information.
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.

          Simulations

          Behavior and APIs

          TimeTypeDescription
          13:22:04API Interceptor960x Sleep call for process: ALP.exe modified
          13:22:08AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          13:22:10Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\ALP.exe" s>$(Arg0)
          13:22:13Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
          13:22:20API Interceptor2x Sleep call for process: dhcpmon.exe modified

          Joe Sandbox View / Context

          IPs

          No context

          Domains

          No context

          ASN

          No context

          JA3 Fingerprints

          No context

          Dropped Files

          No context

          Created / dropped Files

          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Category:dropped
          Size (bytes):603136
          Entropy (8bit):7.259103638799268
          Encrypted:false
          SSDEEP:6144:yEAverZlQDbCMN4K4CJdAbOo36JSGgR9Smne2bEWeeKy2o+0UdzDcQRe2k3OCBuq:1WHCM2K4C4ovgkuK/o+0UmQDk3BuAt/
          MD5:60E9F1E8596C98A6B07129D9C24EC359
          SHA1:0E9E28F2853681A41A9ACE446C0597320452BD9D
          SHA-256:658E8D30979ADD1DFCCCD8ADBA33C136541FE1C9D24BFDEB3FADC5A5A5252716
          SHA-512:8BB79D52B6997C26EDBC94D2CB2DDB8E679ACF77230335EC6A09EC7280DCE5C711D0630007BB33FDE03A5983FC533C89D7A77FD6673FB2100833B82EEBEB820A
          Malicious:true
          Antivirus:
          • Antivirus: Joe Sandbox ML, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 30%
          Reputation:unknown
          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....`K...............0..*...........H... ...`....@.. ....................................@.................................hH..O....`..............................LH............................................... ............... ..H............text....(... ...*.................. ..`.rsrc........`.......,..............@..@.reloc...............2..............@..B.................H......H........?...^......o...T...............................................~..$}......}......}.....(......*...$}......}......}.....(........}......}....*...0..O.........$}......}......}.....(........{....}......{....}......{....}......{....}....*:..{....(.....*...0..w..........R.{........,f.r...p(....-).r!..p(....-%.r-..p(....-%.r9..p(....-%+0..}....+'..J.{....XT+...J.{....XT+...J.{....XT+.*..0...........rE..p.+..*..0...........ro..p.+..*..0..................+..*".(.....*....0..
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):26
          Entropy (8bit):3.95006375643621
          Encrypted:false
          SSDEEP:3:ggPYV:rPYV
          MD5:187F488E27DB4AF347237FE461A079AD
          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
          Malicious:true
          Reputation:unknown
          Preview: [ZoneTransfer]....ZoneId=0
          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ALP.exe.log
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1216
          Entropy (8bit):5.355304211458859
          Encrypted:false
          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
          MD5:FED34146BF2F2FA59DCF8702FCC8232E
          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
          Malicious:true
          Reputation:unknown
          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
          Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1216
          Entropy (8bit):5.355304211458859
          Encrypted:false
          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
          MD5:FED34146BF2F2FA59DCF8702FCC8232E
          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
          Malicious:false
          Reputation:unknown
          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
          C:\Users\user\AppData\Local\Temp\tmp1584.tmp
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1293
          Entropy (8bit):5.098992324361618
          Encrypted:false
          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0bhxtn:cbk4oL600QydbQxIYODOLedq3+hj
          MD5:D956409A7F9A04D5719AC93B66C05125
          SHA1:BB7FE2ACDD9B2670D2B115E2930DB8E008CC7B66
          SHA-256:2A5E542949A1F48675123A33E29B603C8BAA1C4403EF20C30E7918B5AF3BA24E
          SHA-512:D7050605AC5D5F753ABA13075E7F49DB8C47574BFD6CDA4AF3E73F6BF51005423D1B1A4332D5977613335F03BF73B7CC9F203C10D17C5469079E1BE26CC7A70C
          Malicious:true
          Reputation:unknown
          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
          C:\Users\user\AppData\Local\Temp\tmp196D.tmp
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1310
          Entropy (8bit):5.109425792877704
          Encrypted:false
          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
          MD5:5C2F41CFC6F988C859DA7D727AC2B62A
          SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
          SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
          SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
          Malicious:false
          Reputation:unknown
          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:data
          Category:dropped
          Size (bytes):1856
          Entropy (8bit):7.089541637477408
          Encrypted:false
          SSDEEP:48:IknjhUknjhUknjhUknjhUknjhUknjhUknjhUknjhL:HjhDjhDjhDjhDjhDjhDjhDjhL
          MD5:30D23CC577A89146961915B57F408623
          SHA1:9B5709D6081D8E0A570511E6E0AAE96FA041964F
          SHA-256:E2130A72E55193D402B5F43F7F3584ECF6B423F8EC4B1B1B69AD693C7E0E5A9E
          SHA-512:2D5C5747FD04F8326C2CC1FB313925070BC01D3352AFA6C36C167B72757A15F58B6263D96BD606338DA055812E69DDB628A6E18D64DD59697C2F42D1C58CC687
          Malicious:false
          Reputation:unknown
          Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:Non-ISO extended-ASCII text, with no line terminators
          Category:dropped
          Size (bytes):8
          Entropy (8bit):3.0
          Encrypted:false
          SSDEEP:3:Hyn:Hy
          MD5:91F97BE3A5A07812C876B2CFAE334B19
          SHA1:7BF51BB4B5B5E66711E7A42C861E6B56F9E04432
          SHA-256:A6D6BF4A29F7FC8877601FDA279183565E357A0A15B386A3653F8BEC6BD25BA6
          SHA-512:BBA20900727377668DCFDDCD33A1CA0A67E271E850AC6258825EDE5100DC60AD215074CB10258718844ADB58472AC98CCC1C1F9154E759BD3198FD9749CF3213
          Malicious:true
          Reputation:unknown
          Preview: G..~.x.H
          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:data
          Category:modified
          Size (bytes):40
          Entropy (8bit):5.153055907333276
          Encrypted:false
          SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
          MD5:4E5E92E2369688041CC82EF9650EDED2
          SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
          SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
          SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
          Malicious:false
          Reputation:unknown
          Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:data
          Category:dropped
          Size (bytes):327768
          Entropy (8bit):7.999367066417797
          Encrypted:true
          SSDEEP:6144:oX44S90aTiB66x3PlZmqze1d1wI8lkWmtjJ/3Exi:LkjbU7LjGxi
          MD5:2E52F446105FBF828E63CF808B721F9C
          SHA1:5330E54F238F46DC04C1AC62B051DB4FCD7416FB
          SHA-256:2F7479AA2661BD259747BC89106031C11B3A3F79F12190E7F19F5DF65B7C15C8
          SHA-512:C08BA0E3315E2314ECBEF38722DF834C2CB8412446A9A310F41A8F83B4AC5984FCC1B26A1D8B0D58A730FDBDD885714854BDFD04DCDF7F582FC125F552D5C3CA
          Malicious:false
          Reputation:unknown
          Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
          Process:C:\Users\user\Desktop\ALP.exe
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):30
          Entropy (8bit):4.148394345536403
          Encrypted:false
          SSDEEP:3:oNWXp5vkp2dA:oNWXpFkp2C
          MD5:D71F830F25284967D78C5C979EF8A7FE
          SHA1:FA4FC2F5C82658A6A5765EC66F30F993C21EDA26
          SHA-256:84A815A94DBF4EF7BDF2867466F880341415080F918CC91F2CA3DFAECAF1A490
          SHA-512:DB529CABD7057AA8C57CB89DAC5DA55341666324BC1BB0D090AB48C8275EA7A41D993E7D2AB29CC7873CF0E96889A968B0EA4C5849AAE1BF2F6AF46684467E85
          Malicious:false
          Reputation:unknown
          Preview: C:\Users\user\Desktop\ALP.exe

          Static File Info

          General

          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):7.259103638799268
          TrID:
          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          • Win32 Executable (generic) a (10002005/4) 49.78%
          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
          • Generic Win/DOS Executable (2004/3) 0.01%
          • DOS Executable Generic (2002/1) 0.01%
          File name:ALP.exe
          File size:603136
          MD5:60e9f1e8596c98a6b07129d9c24ec359
          SHA1:0e9e28f2853681a41a9ace446c0597320452bd9d
          SHA256:658e8d30979add1dfcccd8adba33c136541fe1c9d24bfdeb3fadc5a5a5252716
          SHA512:8bb79d52b6997c26edbc94d2cb2ddb8e679acf77230335ec6a09ec7280dce5c711d0630007bb33fde03a5983fc533c89d7a77fd6673fb2100833b82eebeb820a
          SSDEEP:6144:yEAverZlQDbCMN4K4CJdAbOo36JSGgR9Smne2bEWeeKy2o+0UdzDcQRe2k3OCBuq:1WHCM2K4C4ovgkuK/o+0UmQDk3BuAt/
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....`K...............0..*...........H... ...`....@.. ....................................@................................

          File Icon

          Icon Hash:00828e8e8686b000

          Static PE Info

          General

          Entrypoint:0x4948ba
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Time Stamp:0x8C4B6098 [Tue Aug 2 11:29:28 2044 UTC]
          TLS Callbacks:
          CLR (.Net) Version:v4.0.30319
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

          Entrypoint Preview

          Instruction
          jmp dword ptr [00402000h]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al

          Data Directories

          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x948680x4f.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x960000x5bc.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x980000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x9484c0x1c.text
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

          Sections

          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000x928c00x92a00False0.779385123615data7.26903403564IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          .rsrc0x960000x5bc0x600False0.422526041667data4.10411488678IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x980000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

          Resources

          NameRVASizeTypeLanguageCountry
          RT_VERSION0x960900x32cdata
          RT_MANIFEST0x963cc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

          Imports

          DLLImport
          mscoree.dll_CorExeMain

          Version Infos

          DescriptionData
          Translation0x0000 0x04b0
          LegalCopyrightCopyright 2019
          Assembly Version1.0.0.0
          InternalNameCurrencyWrapp.exe
          FileVersion1.0.0.0
          CompanyName
          LegalTrademarks
          Comments
          ProductNameDisciples
          ProductVersion1.0.0.0
          FileDescriptionDisciples
          OriginalFilenameCurrencyWrapp.exe

          Network Behavior

          Snort IDS Alerts

          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
          09/15/21-13:22:12.853834UDP254DNS SPOOF query response with TTL of 1 min. and no authority53649388.8.8.8192.168.2.3
          09/15/21-13:22:13.241852TCP2025019ET TROJAN Possible NanoCore C2 60B497377712192.168.2.3185.174.101.21
          09/15/21-13:22:21.114784TCP2025019ET TROJAN Possible NanoCore C2 60B497387712192.168.2.3185.174.101.21
          09/15/21-13:22:27.938934UDP254DNS SPOOF query response with TTL of 1 min. and no authority53559848.8.8.8192.168.2.3
          09/15/21-13:22:28.099478TCP2025019ET TROJAN Possible NanoCore C2 60B497437712192.168.2.3185.174.101.21
          09/15/21-13:22:34.652919UDP254DNS SPOOF query response with TTL of 1 min. and no authority53651108.8.8.8192.168.2.3
          09/15/21-13:22:34.897642TCP2025019ET TROJAN Possible NanoCore C2 60B497467712192.168.2.3185.174.101.21
          09/15/21-13:22:42.233206UDP254DNS SPOOF query response with TTL of 1 min. and no authority53583618.8.8.8192.168.2.3
          09/15/21-13:22:42.392415TCP2025019ET TROJAN Possible NanoCore C2 60B497477712192.168.2.3185.174.101.21
          09/15/21-13:22:49.136770UDP254DNS SPOOF query response with TTL of 1 min. and no authority53634928.8.8.8192.168.2.3
          09/15/21-13:22:49.295921TCP2025019ET TROJAN Possible NanoCore C2 60B497487712192.168.2.3185.174.101.21
          09/15/21-13:22:56.152735TCP2025019ET TROJAN Possible NanoCore C2 60B497587712192.168.2.3185.174.101.21
          09/15/21-13:23:04.336455TCP2025019ET TROJAN Possible NanoCore C2 60B497777712192.168.2.3185.174.101.21
          09/15/21-13:23:10.294889UDP254DNS SPOOF query response with TTL of 1 min. and no authority53593498.8.8.8192.168.2.3
          09/15/21-13:23:10.454663TCP2025019ET TROJAN Possible NanoCore C2 60B497867712192.168.2.3185.174.101.21
          09/15/21-13:23:16.512568TCP2025019ET TROJAN Possible NanoCore C2 60B497877712192.168.2.3185.174.101.21
          09/15/21-13:23:24.417530UDP254DNS SPOOF query response with TTL of 1 min. and no authority53588238.8.8.8192.168.2.3
          09/15/21-13:23:24.629528TCP2025019ET TROJAN Possible NanoCore C2 60B497887712192.168.2.3185.174.101.21
          09/15/21-13:23:31.488898UDP254DNS SPOOF query response with TTL of 1 min. and no authority53575688.8.8.8192.168.2.3
          09/15/21-13:23:31.648678TCP2025019ET TROJAN Possible NanoCore C2 60B497897712192.168.2.3185.174.101.21
          09/15/21-13:23:38.181844TCP2025019ET TROJAN Possible NanoCore C2 60B497907712192.168.2.3185.174.101.21
          09/15/21-13:23:44.940027TCP2025019ET TROJAN Possible NanoCore C2 60B497957712192.168.2.3185.174.101.21
          09/15/21-13:23:52.013541UDP254DNS SPOOF query response with TTL of 1 min. and no authority53554358.8.8.8192.168.2.3
          09/15/21-13:23:52.194930TCP2025019ET TROJAN Possible NanoCore C2 60B497967712192.168.2.3185.174.101.21
          09/15/21-13:23:59.061052TCP2025019ET TROJAN Possible NanoCore C2 60B497977712192.168.2.3185.174.101.21
          09/15/21-13:24:05.994918TCP2025019ET TROJAN Possible NanoCore C2 60B497987712192.168.2.3185.174.101.21

          Network Port Distribution

          TCP Packets

          TimestampSource PortDest PortSource IPDest IP
          Sep 15, 2021 13:22:13.020806074 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:13.177186012 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:13.177298069 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:13.241852045 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:13.414644957 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:13.414748907 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:13.630182028 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:13.630240917 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:13.786406994 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:13.802582979 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.004131079 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.010858059 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.010895014 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.010920048 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.010943890 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.011013031 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.011039972 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.172450066 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.172557116 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.172580957 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.172602892 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.172626972 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.172645092 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.172665119 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.172683001 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.172689915 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.172785997 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.235379934 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.331872940 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.331934929 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.333822966 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.333856106 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.333879948 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.333893061 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.333904028 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.333905935 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.333925962 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.333929062 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.333946943 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.333956957 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.333966970 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.333981991 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.333997965 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.334006071 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.334021091 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.334029913 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.334042072 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.334054947 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.334070921 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.334079027 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.334089041 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.334104061 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.334127903 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.334146976 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.334156036 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.334180117 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.334211111 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.447072983 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.489432096 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.489473104 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.489589930 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.491110086 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491252899 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491277933 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491303921 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491328955 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491331100 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.491350889 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491374969 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491400957 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.491405010 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491430998 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491453886 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491476059 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491497993 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491519928 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491542101 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.491548061 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491574049 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491584063 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.491600037 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491624117 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491631031 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.491652966 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491677999 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491700888 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491720915 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.491724968 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491753101 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491775990 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491800070 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491822004 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491847992 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491862059 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.491872072 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491894960 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.491936922 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.492019892 CEST497377712192.168.2.3185.174.101.21
          Sep 15, 2021 13:22:14.647950888 CEST771249737185.174.101.21192.168.2.3
          Sep 15, 2021 13:22:14.648046970 CEST771249737185.174.101.21192.168.2.3

          UDP Packets

          TimestampSource PortDest PortSource IPDest IP
          Sep 15, 2021 13:21:55.225199938 CEST5062053192.168.2.38.8.8.8
          Sep 15, 2021 13:21:55.260210991 CEST53506208.8.8.8192.168.2.3
          Sep 15, 2021 13:22:12.812036991 CEST6493853192.168.2.38.8.8.8
          Sep 15, 2021 13:22:12.853833914 CEST53649388.8.8.8192.168.2.3
          Sep 15, 2021 13:22:20.757668018 CEST6015253192.168.2.38.8.8.8
          Sep 15, 2021 13:22:20.787748098 CEST53601528.8.8.8192.168.2.3
          Sep 15, 2021 13:22:24.241019964 CEST5754453192.168.2.38.8.8.8
          Sep 15, 2021 13:22:24.282948971 CEST53575448.8.8.8192.168.2.3
          Sep 15, 2021 13:22:27.901772022 CEST5598453192.168.2.38.8.8.8
          Sep 15, 2021 13:22:27.938934088 CEST53559848.8.8.8192.168.2.3
          Sep 15, 2021 13:22:28.996938944 CEST6418553192.168.2.38.8.8.8
          Sep 15, 2021 13:22:29.033538103 CEST53641858.8.8.8192.168.2.3
          Sep 15, 2021 13:22:34.624207973 CEST6511053192.168.2.38.8.8.8
          Sep 15, 2021 13:22:34.652919054 CEST53651108.8.8.8192.168.2.3
          Sep 15, 2021 13:22:42.201474905 CEST5836153192.168.2.38.8.8.8
          Sep 15, 2021 13:22:42.233206034 CEST53583618.8.8.8192.168.2.3
          Sep 15, 2021 13:22:49.108741999 CEST6349253192.168.2.38.8.8.8
          Sep 15, 2021 13:22:49.136770010 CEST53634928.8.8.8192.168.2.3
          Sep 15, 2021 13:22:54.068249941 CEST6083153192.168.2.38.8.8.8
          Sep 15, 2021 13:22:54.106496096 CEST53608318.8.8.8192.168.2.3
          Sep 15, 2021 13:22:55.955784082 CEST6010053192.168.2.38.8.8.8
          Sep 15, 2021 13:22:55.983608007 CEST53601008.8.8.8192.168.2.3
          Sep 15, 2021 13:23:02.126761913 CEST5319553192.168.2.38.8.8.8
          Sep 15, 2021 13:23:02.127106905 CEST5014153192.168.2.38.8.8.8
          Sep 15, 2021 13:23:02.161456108 CEST53501418.8.8.8192.168.2.3
          Sep 15, 2021 13:23:02.163528919 CEST53531958.8.8.8192.168.2.3
          Sep 15, 2021 13:23:04.145071030 CEST5302353192.168.2.38.8.8.8
          Sep 15, 2021 13:23:04.174401045 CEST53530238.8.8.8192.168.2.3
          Sep 15, 2021 13:23:04.848917961 CEST4956353192.168.2.38.8.8.8
          Sep 15, 2021 13:23:04.879153013 CEST53495638.8.8.8192.168.2.3
          Sep 15, 2021 13:23:08.987534046 CEST5135253192.168.2.38.8.8.8
          Sep 15, 2021 13:23:09.019470930 CEST53513528.8.8.8192.168.2.3
          Sep 15, 2021 13:23:10.264875889 CEST5934953192.168.2.38.8.8.8
          Sep 15, 2021 13:23:10.294888973 CEST53593498.8.8.8192.168.2.3
          Sep 15, 2021 13:23:16.324917078 CEST5708453192.168.2.38.8.8.8
          Sep 15, 2021 13:23:16.351373911 CEST53570848.8.8.8192.168.2.3
          Sep 15, 2021 13:23:24.390568972 CEST5882353192.168.2.38.8.8.8
          Sep 15, 2021 13:23:24.417530060 CEST53588238.8.8.8192.168.2.3
          Sep 15, 2021 13:23:31.457323074 CEST5756853192.168.2.38.8.8.8
          Sep 15, 2021 13:23:31.488898039 CEST53575688.8.8.8192.168.2.3
          Sep 15, 2021 13:23:37.994369030 CEST5054053192.168.2.38.8.8.8
          Sep 15, 2021 13:23:38.022464991 CEST53505408.8.8.8192.168.2.3
          Sep 15, 2021 13:23:40.911014080 CEST5436653192.168.2.38.8.8.8
          Sep 15, 2021 13:23:40.951396942 CEST53543668.8.8.8192.168.2.3
          Sep 15, 2021 13:23:43.463290930 CEST5303453192.168.2.38.8.8.8
          Sep 15, 2021 13:23:43.507141113 CEST53530348.8.8.8192.168.2.3
          Sep 15, 2021 13:23:44.690823078 CEST5776253192.168.2.38.8.8.8
          Sep 15, 2021 13:23:44.720443964 CEST53577628.8.8.8192.168.2.3
          Sep 15, 2021 13:23:51.904139042 CEST5543553192.168.2.38.8.8.8
          Sep 15, 2021 13:23:52.013540983 CEST53554358.8.8.8192.168.2.3
          Sep 15, 2021 13:23:58.869739056 CEST5071353192.168.2.38.8.8.8
          Sep 15, 2021 13:23:58.897445917 CEST53507138.8.8.8192.168.2.3
          Sep 15, 2021 13:24:05.792474985 CEST5613253192.168.2.38.8.8.8
          Sep 15, 2021 13:24:05.822530031 CEST53561328.8.8.8192.168.2.3

          DNS Queries

          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
          Sep 15, 2021 13:22:12.812036991 CEST192.168.2.38.8.8.80xb3d1Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:22:20.757668018 CEST192.168.2.38.8.8.80x48f3Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:22:27.901772022 CEST192.168.2.38.8.8.80x84c1Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:22:34.624207973 CEST192.168.2.38.8.8.80xecdbStandard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:22:42.201474905 CEST192.168.2.38.8.8.80x1fe0Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:22:49.108741999 CEST192.168.2.38.8.8.80xadccStandard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:22:55.955784082 CEST192.168.2.38.8.8.80x159Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:04.145071030 CEST192.168.2.38.8.8.80x377fStandard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:10.264875889 CEST192.168.2.38.8.8.80x38caStandard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:16.324917078 CEST192.168.2.38.8.8.80x740fStandard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:24.390568972 CEST192.168.2.38.8.8.80x5a7cStandard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:31.457323074 CEST192.168.2.38.8.8.80xd144Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:37.994369030 CEST192.168.2.38.8.8.80xb6b4Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:44.690823078 CEST192.168.2.38.8.8.80xd875Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:51.904139042 CEST192.168.2.38.8.8.80x45efStandard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:23:58.869739056 CEST192.168.2.38.8.8.80xc018Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)
          Sep 15, 2021 13:24:05.792474985 CEST192.168.2.38.8.8.80xa801Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)

          DNS Answers

          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
          Sep 15, 2021 13:22:12.853833914 CEST8.8.8.8192.168.2.30xb3d1No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:22:20.787748098 CEST8.8.8.8192.168.2.30x48f3No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:22:27.938934088 CEST8.8.8.8192.168.2.30x84c1No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:22:34.652919054 CEST8.8.8.8192.168.2.30xecdbNo error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:22:42.233206034 CEST8.8.8.8192.168.2.30x1fe0No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:22:49.136770010 CEST8.8.8.8192.168.2.30xadccNo error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:22:55.983608007 CEST8.8.8.8192.168.2.30x159No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:04.174401045 CEST8.8.8.8192.168.2.30x377fNo error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:10.294888973 CEST8.8.8.8192.168.2.30x38caNo error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:16.351373911 CEST8.8.8.8192.168.2.30x740fNo error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:24.417530060 CEST8.8.8.8192.168.2.30x5a7cNo error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:31.488898039 CEST8.8.8.8192.168.2.30xd144No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:38.022464991 CEST8.8.8.8192.168.2.30xb6b4No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:44.720443964 CEST8.8.8.8192.168.2.30xd875No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:52.013540983 CEST8.8.8.8192.168.2.30x45efNo error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:23:58.897445917 CEST8.8.8.8192.168.2.30xc018No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)
          Sep 15, 2021 13:24:05.822530031 CEST8.8.8.8192.168.2.30xa801No error (0)godisgood1.hopto.org185.174.101.21A (IP address)IN (0x0001)

          Code Manipulations

          Statistics

          Behavior

          Click to jump to process

          System Behavior

          General

          Start time:13:22:01
          Start date:15/09/2021
          Path:C:\Users\user\Desktop\ALP.exe
          Wow64 process (32bit):true
          Commandline:'C:\Users\user\Desktop\ALP.exe'
          Imagebase:0xfd0000
          File size:603136 bytes
          MD5 hash:60E9F1E8596C98A6B07129D9C24EC359
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.235658779.00000000033B1000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.236509698.00000000043A9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          Reputation:low

          General

          Start time:13:22:06
          Start date:15/09/2021
          Path:C:\Users\user\Desktop\ALP.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\ALP.exe
          Imagebase:0x770000
          File size:603136 bytes
          MD5 hash:60E9F1E8596C98A6B07129D9C24EC359
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Reputation:low

          General

          Start time:13:22:08
          Start date:15/09/2021
          Path:C:\Windows\SysWOW64\schtasks.exe
          Wow64 process (32bit):true
          Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp1584.tmp'
          Imagebase:0xf70000
          File size:185856 bytes
          MD5 hash:15FF7D8324231381BAD48A052F85DF04
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          General

          Start time:13:22:09
          Start date:15/09/2021
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff6b2800000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          General

          Start time:13:22:09
          Start date:15/09/2021
          Path:C:\Windows\SysWOW64\schtasks.exe
          Wow64 process (32bit):true
          Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp196D.tmp'
          Imagebase:0xf70000
          File size:185856 bytes
          MD5 hash:15FF7D8324231381BAD48A052F85DF04
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          General

          Start time:13:22:10
          Start date:15/09/2021
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff6b2800000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          General

          Start time:13:22:10
          Start date:15/09/2021
          Path:C:\Users\user\Desktop\ALP.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\ALP.exe 0
          Imagebase:0x190000
          File size:603136 bytes
          MD5 hash:60E9F1E8596C98A6B07129D9C24EC359
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000009.00000002.263837733.0000000002521000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.266056767.0000000003519000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

          General

          Start time:13:22:13
          Start date:15/09/2021
          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Wow64 process (32bit):true
          Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
          Imagebase:0x150000
          File size:603136 bytes
          MD5 hash:60E9F1E8596C98A6B07129D9C24EC359
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.276215883.0000000003509000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000B.00000002.274932802.0000000002512000.00000004.00000001.sdmp, Author: Joe Security
          Antivirus matches:
          • Detection: 100%, Joe Sandbox ML
          • Detection: 30%, ReversingLabs

          General

          Start time:13:22:14
          Start date:15/09/2021
          Path:C:\Users\user\Desktop\ALP.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\ALP.exe
          Imagebase:0x5e0000
          File size:603136 bytes
          MD5 hash:60E9F1E8596C98A6B07129D9C24EC359
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.281666136.00000000029E1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.277963611.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.281986057.00000000039E9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

          General

          Start time:13:22:17
          Start date:15/09/2021
          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Wow64 process (32bit):true
          Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
          Imagebase:0x9d0000
          File size:603136 bytes
          MD5 hash:60E9F1E8596C98A6B07129D9C24EC359
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000D.00000002.280895515.0000000002D32000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.282576111.0000000003D29000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

          Disassembly

          Code Analysis

          Reset < >