Loading ...

Play interactive tourEdit tour

Windows Analysis Report manager.exe

Overview

General Information

Sample Name:manager.exe
Analysis ID:494994
MD5:1479371ef0752f027661fc1b7748b318
SHA1:3bf6809d0987cd82ec328b7bbdbcc5618743cf38
SHA256:183923330057af95cedb73d0aa2e7f844dba89df8866995f483be4c5780298b3
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Yara detected Nanocore RAT
Machine Learning detection for sample
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports

Classification

Process Tree

  • System is w10x64
  • manager.exe (PID: 6836 cmdline: 'C:\Users\user\Desktop\manager.exe' MD5: 1479371EF0752F027661FC1B7748B318)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "69d5e1dd-adbf-4c76-9eba-4ac963b0", "Group": "Manager", "Domain1": "findmyservice.ignorelist.com", "Port": 4001, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
manager.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1018d:$x1: NanoCore.ClientPluginHost
  • 0x101ca:$x2: IClientNetworkHost
  • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
manager.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xff05:$x1: NanoCore Client.exe
  • 0x1018d:$x2: NanoCore.ClientPluginHost
  • 0x117c6:$s1: PluginCommand
  • 0x117ba:$s2: FileCommand
  • 0x1266b:$s3: PipeExists
  • 0x18422:$s4: PipeCreated
  • 0x101b7:$s5: IClientLoggingHost
manager.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    manager.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfef5:$a: NanoCore
    • 0xff05:$a: NanoCore
    • 0x10139:$a: NanoCore
    • 0x1014d:$a: NanoCore
    • 0x1018d:$a: NanoCore
    • 0xff54:$b: ClientPlugin
    • 0x10156:$b: ClientPlugin
    • 0x10196:$b: ClientPlugin
    • 0x1007b:$c: ProjectData
    • 0x10a82:$d: DESCrypto
    • 0x1844e:$e: KeepAlive
    • 0x1643c:$g: LogClientMessage
    • 0x12637:$i: get_Connected
    • 0x10db8:$j: #=q
    • 0x10de8:$j: #=q
    • 0x10e04:$j: #=q
    • 0x10e34:$j: #=q
    • 0x10e50:$j: #=q
    • 0x10e6c:$j: #=q
    • 0x10e9c:$j: #=q
    • 0x10eb8:$j: #=q

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000000.00000002.613548998.0000000004E00000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    00000000.00000002.613548998.0000000004E00000.00000004.00020000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    00000000.00000002.613718440.00000000051B0000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xf7ad:$x1: NanoCore.ClientPluginHost
    • 0xf7da:$x2: IClientNetworkHost
    00000000.00000002.613718440.00000000051B0000.00000004.00020000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xf7ad:$x2: NanoCore.ClientPluginHost
    • 0x10888:$s4: PipeCreated
    • 0xf7c7:$s5: IClientLoggingHost
    00000000.00000002.613718440.00000000051B0000.00000004.00020000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 10 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      0.2.manager.exe.51b0000.7.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xf7ad:$x1: NanoCore.ClientPluginHost
      • 0xf7da:$x2: IClientNetworkHost
      0.2.manager.exe.51b0000.7.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xf7ad:$x2: NanoCore.ClientPluginHost
      • 0x10888:$s4: PipeCreated
      • 0xf7c7:$s5: IClientLoggingHost
      0.2.manager.exe.51b0000.7.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        0.2.manager.exe.3a42a75.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xb184:$x1: NanoCore.ClientPluginHost
        • 0x23c50:$x1: NanoCore.ClientPluginHost
        • 0xb1b1:$x2: IClientNetworkHost
        • 0x23c7d:$x2: IClientNetworkHost
        0.2.manager.exe.3a42a75.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xb184:$x2: NanoCore.ClientPluginHost
        • 0x23c50:$x2: NanoCore.ClientPluginHost
        • 0xc25f:$s4: PipeCreated
        • 0x24d2b:$s4: PipeCreated
        • 0xb19e:$s5: IClientLoggingHost
        • 0x23c6a:$s5: IClientLoggingHost
        Click to see the 29 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\manager.exe, ProcessId: 6836, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\manager.exe, ProcessId: 6836, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\manager.exe, ProcessId: 6836, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\manager.exe, ProcessId: 6836, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000000.00000002.612976062.0000000003A28000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "69d5e1dd-adbf-4c76-9eba-4ac963b0", "Group": "Manager", "Domain1": "findmyservice.ignorelist.com", "Port": 4001, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Multi AV Scanner detection for submitted fileShow sources
        Source: manager.exeVirustotal: Detection: 88%Perma Link
        Source: manager.exeMetadefender: Detection: 85%Perma Link
        Source: manager.exeReversingLabs: Detection: 97%
        Antivirus / Scanner detection for submitted sampleShow sources
        Source: manager.exeAvira: detected
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: manager.exe, type: SAMPLE
        Source: Yara matchFile source: 0.2.manager.exe.51b0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.3a42a75.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.290000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.3a39616.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.3a3e44c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.51b4629.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.51b0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.3a3e44c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.0.manager.exe.290000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000002.613718440.00000000051B0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000000.341607342.0000000000292000.00000002.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.609531824.0000000000292000.00000002.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.612976062.0000000003A28000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: manager.exe PID: 6836, type: MEMORYSTR
        Machine Learning detection for sampleShow sources
        Source: manager.exeJoe Sandbox ML: detected
        Source: 0.0.manager.exe.290000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 0.2.manager.exe.51b0000.7.unpackAvira: Label: TR/NanoCore.fadte
        Source: 0.2.manager.exe.290000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: manager.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
        Source: C:\Users\user\Desktop\manager.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs:
        Source: Malware configuration extractorURLs: findmyservice.ignorelist.com
        Source: global trafficTCP traffic: 192.168.2.6:49753 -> 37.0.10.38:4001
        Source: unknownDNS traffic detected: queries for: findmyservice.ignorelist.com
        Source: manager.exe, 00000000.00000002.613718440.00000000051B0000.00000004.00020000.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: manager.exe, type: SAMPLE
        Source: Yara matchFile source: 0.2.manager.exe.51b0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.3a42a75.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.290000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.3a39616.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.3a3e44c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.51b4629.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.51b0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.3a3e44c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.0.manager.exe.290000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000002.613718440.00000000051B0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000000.341607342.0000000000292000.00000002.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.609531824.0000000000292000.00000002.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.612976062.0000000003A28000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: manager.exe PID: 6836, type: MEMORYSTR

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: manager.exe, type: SAMPLEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: manager.exe, type: SAMPLEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.manager.exe.51b0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.manager.exe.3a42a75.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.manager.exe.4e00000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.manager.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.manager.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.manager.exe.3a39616.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.manager.exe.3a39616.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.manager.exe.3a3e44c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.manager.exe.51b4629.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.manager.exe.51b0000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.manager.exe.2a01770.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.manager.exe.3a3e44c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.0.manager.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.0.manager.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.613548998.0000000004E00000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.613718440.00000000051B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000000.341607342.0000000000292000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000000.341607342.0000000000292000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.609531824.0000000000292000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.609531824.0000000000292000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.612976062.0000000003A28000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: manager.exe PID: 6836, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: manager.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
        Source: manager.exe, type: SAMPLEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: manager.exe, type: SAMPLEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: manager.exe, type: SAMPLEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.manager.exe.51b0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.manager.exe.51b0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.manager.exe.3a42a75.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.manager.exe.3a42a75.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.manager.exe.4e00000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.manager.exe.4e00000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.manager.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.manager.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.manager.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.manager.exe.3a39616.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.manager.exe.3a39616.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.manager.exe.3a39616.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.manager.exe.3a3e44c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.manager.exe.3a3e44c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.manager.exe.51b4629.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.manager.exe.51b4629.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.manager.exe.51b0000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.manager.exe.51b0000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.manager.exe.2a01770.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.manager.exe.2a01770.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.manager.exe.3a3e44c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.manager.exe.3a3e44c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.0.manager.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.0.manager.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.0.manager.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.613548998.0000000004E00000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.613548998.0000000004E00000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000002.613718440.00000000051B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.613718440.00000000051B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000000.341607342.0000000000292000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000000.341607342.0000000000292000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.609531824.0000000000292000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.609531824.0000000000292000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.612976062.0000000003A28000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: manager.exe PID: 6836, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_0029524A
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_0263AF3C
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_026323A0
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_02632FA8
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_02638468
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_02639068
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_02633850
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_0263306F
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_0263912F
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_0269116A NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_0269112F NtQuerySystemInformation,
        Source: manager.exe, 00000000.00000002.613548998.0000000004E00000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs manager.exe
        Source: manager.exe, 00000000.00000002.613718440.00000000051B0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs manager.exe
        Source: manager.exe, 00000000.00000002.613718440.00000000051B0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs manager.exe
        Source: manager.exeStatic PE information: Section: .rsrc ZLIB complexity 0.999810267857
        Source: manager.exeVirustotal: Detection: 88%
        Source: manager.exeMetadefender: Detection: 85%
        Source: manager.exeReversingLabs: Detection: 97%
        Source: C:\Users\user\Desktop\manager.exeFile read: C:\Users\user\Desktop\manager.exeJump to behavior
        Source: manager.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\manager.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Users\user\Desktop\manager.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_02690F2A AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_02690EF3 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\manager.exeFile created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9AJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@1/1@6/2
        Source: 0.0.manager.exe.290000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 0.0.manager.exe.290000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 0.2.manager.exe.290000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 0.2.manager.exe.290000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: manager.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: manager.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: C:\Users\user\Desktop\manager.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\manager.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\manager.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\manager.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Users\user\Desktop\manager.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{69d5e1dd-adbf-4c76-9eba-4ac963b03999}
        Source: manager.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: manager.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: manager.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 0.0.manager.exe.290000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 0.0.manager.exe.290000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.0.manager.exe.290000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 0.2.manager.exe.290000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 0.2.manager.exe.290000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.manager.exe.290000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: C:\Users\user\Desktop\manager.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: C:\Users\user\Desktop\manager.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: manager.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: manager.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: manager.exe, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.manager.exe.290000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.manager.exe.290000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.manager.exe.290000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.manager.exe.290000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_009A74B8 push ebp; ret
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_009A74AC push ecx; ret
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_009AABD8 push cs; retf
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_009AAAEF push cs; retf
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_009AAB63 push cs; retf
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_026912B0 push ebx; retn 0004h
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_026A0D9B push 00000002h; retn 0008h
        Source: manager.exe, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: manager.exe, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 0.0.manager.exe.290000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 0.0.manager.exe.290000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 0.2.manager.exe.290000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 0.2.manager.exe.290000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\manager.exeFile opened: C:\Users\user\Desktop\manager.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\manager.exe TID: 6916Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\manager.exe TID: 6892Thread sleep time: -160000s >= -30000s
        Source: C:\Users\user\Desktop\manager.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\manager.exeWindow / User API: threadDelayed 703
        Source: C:\Users\user\Desktop\manager.exeWindow / User API: foregroundWindowGot 1042
        Source: C:\Users\user\Desktop\manager.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_02690BB6 GetSystemInfo,
        Source: C:\Users\user\Desktop\manager.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\manager.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\manager.exeMemory allocated: page read and write | page guard
        Source: manager.exe, 00000000.00000002.612860744.0000000002C7E000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: manager.exe, 00000000.00000002.611367017.0000000001110000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
        Source: manager.exe, 00000000.00000002.611367017.0000000001110000.00000002.00020000.sdmpBinary or memory string: Progman
        Source: manager.exe, 00000000.00000002.611872127.0000000002A7E000.00000004.00000001.sdmpBinary or memory string: Program Managerp
        Source: manager.exe, 00000000.00000002.611367017.0000000001110000.00000002.00020000.sdmpBinary or memory string: &Program Manager
        Source: manager.exe, 00000000.00000002.611367017.0000000001110000.00000002.00020000.sdmpBinary or memory string: Progmanlock
        Source: C:\Users\user\Desktop\manager.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_0099AF9A GetUserNameW,

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: manager.exe, type: SAMPLE
        Source: Yara matchFile source: 0.2.manager.exe.51b0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.3a42a75.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.290000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.3a39616.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.3a3e44c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.51b4629.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.51b0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.3a3e44c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.0.manager.exe.290000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000002.613718440.00000000051B0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000000.341607342.0000000000292000.00000002.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.609531824.0000000000292000.00000002.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.612976062.0000000003A28000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: manager.exe PID: 6836, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: manager.exeString found in binary or memory: NanoCore.ClientPluginHost
        Source: manager.exe, 00000000.00000002.613548998.0000000004E00000.00000004.00020000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: manager.exeString found in binary or memory: NanoCore.ClientPluginHost
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: manager.exe, type: SAMPLE
        Source: Yara matchFile source: 0.2.manager.exe.51b0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.3a42a75.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.290000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.3a39616.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.3a3e44c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.51b4629.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.51b0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.manager.exe.3a3e44c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.0.manager.exe.290000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000002.613718440.00000000051B0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000000.341607342.0000000000292000.00000002.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.609531824.0000000000292000.00000002.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.612976062.0000000003A28000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: manager.exe PID: 6836, type: MEMORYSTR
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_0269247A bind,
        Source: C:\Users\user\Desktop\manager.exeCode function: 0_2_02692428 bind,

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management InstrumentationPath InterceptionAccess Token Manipulation1Masquerading1Input Capture11Process Discovery2Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection1Disable or Modify Tools1LSASS MemoryVirtualization/Sandbox Evasion21Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerApplication Window Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSAccount Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection1LSA SecretsSystem Owner/User Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Information Discovery3VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsHidden Files and Directories1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobObfuscated Files or Information1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing12/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        manager.exe88%VirustotalBrowse
        manager.exe86%MetadefenderBrowse
        manager.exe98%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
        manager.exe100%AviraTR/Dropper.MSIL.Gen7
        manager.exe100%Joe Sandbox ML

        Dropped Files

        No Antivirus matches

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        0.0.manager.exe.290000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        0.2.manager.exe.51b0000.7.unpack100%AviraTR/NanoCore.fadteDownload File
        0.2.manager.exe.290000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        findmyservice.ignorelist.com
        127.0.0.2
        truefalse
          high

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          true
          • Avira URL Cloud: safe
          low
          findmyservice.ignorelist.comfalse
            high

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            37.0.10.38
            unknownNetherlands
            198301WKD-ASIEfalse

            Private

            IP
            127.0.0.2

            General Information

            Joe Sandbox Version:33.0.0 White Diamond
            Analysis ID:494994
            Start date:01.10.2021
            Start time:09:45:19
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 6m 41s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:manager.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:17
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@1/1@6/2
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:Failed
            HCA Information:
            • Successful, ratio: 99%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            Warnings:
            Show All
            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
            • Excluded IPs from analysis (whitelisted): 20.82.209.183, 23.0.174.184, 23.0.174.200, 20.54.110.249, 40.112.88.60, 23.10.249.26, 23.10.249.43, 95.100.54.203, 20.50.102.62
            • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, a767.dspw65.akamai.net, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, arc.msn.com, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            09:46:17API Interceptor1006x Sleep call for process: manager.exe modified

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            37.0.10.38manager.exeGet hashmaliciousBrowse

              Domains

              No context

              ASN

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              WKD-ASIEmanager.exeGet hashmaliciousBrowse
              • 37.0.10.38
              37B2718705E2CDCBE38E2E27173BA95467B68D45187A2.exeGet hashmaliciousBrowse
              • 37.0.8.119
              20F43079CF75825C5E909B04F3C0B8BDB2F71BE7477FB.exeGet hashmaliciousBrowse
              • 37.0.8.119
              A6A0C59A5F4C53AC5DF74AAE93D700CF287A370505D81.exeGet hashmaliciousBrowse
              • 37.0.10.214
              63301A39B93B63ACAB80E0A05B909F733D792C7AE829A.exeGet hashmaliciousBrowse
              • 37.0.8.119
              F2F9785308BB396F5EB8C14E746228D3298A5984313EF.exeGet hashmaliciousBrowse
              • 37.0.10.214
              3153CAF54366C0DDEDDD293791B8F05EABD7343D9A73C.exeGet hashmaliciousBrowse
              • 37.0.8.119
              Circular PSSB Parts Disc Credit Term (Dlr) s.exeGet hashmaliciousBrowse
              • 37.0.10.22
              view_2021-09-29_07-17.exeGet hashmaliciousBrowse
              • 37.0.8.36
              IznT1D3bT1.exeGet hashmaliciousBrowse
              • 37.0.8.154
              T.T.exeGet hashmaliciousBrowse
              • 37.0.10.22
              manager.exeGet hashmaliciousBrowse
              • 37.0.10.38
              EXTRACTO_SERFINANZA_4295529724698441156_542157354638_25702910368262995_65000377634382740.exeGet hashmaliciousBrowse
              • 37.0.10.149
              PPT-0000084510027306.exeGet hashmaliciousBrowse
              • 37.0.10.190
              071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exeGet hashmaliciousBrowse
              • 37.0.8.119
              2awEYXkQvX.exeGet hashmaliciousBrowse
              • 37.0.8.119
              DOCU_SIGN8289292930001028838.PDF.exeGet hashmaliciousBrowse
              • 37.0.8.37
              Product List.exeGet hashmaliciousBrowse
              • 37.0.8.14
              A4B51BD72DFFD28AD3841217FFEC9E43D21EE3C6F889B.exeGet hashmaliciousBrowse
              • 37.0.8.119
              44F3C573B5D6D77D97C2EBF5D4A235DA5AED3A18EB5B7.exeGet hashmaliciousBrowse
              • 37.0.8.119

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
              Process:C:\Users\user\Desktop\manager.exe
              File Type:data
              Category:dropped
              Size (bytes):8
              Entropy (8bit):3.0
              Encrypted:false
              SSDEEP:3:Ffqtn:lWn
              MD5:9B62CE3A1EEDE3F40D94989F6205DEC5
              SHA1:2A90D0264E08BCCF4B5802F4854DE614FADA3010
              SHA-256:EBE4EAF950A638CD915D08F8F92868B77A7534F14BF984B7CBB58F0592193391
              SHA-512:0090E5A0A6246E4568AAFC1DFCD9FF0FF1C8E5182211528B00D161A36B492FFFB1E852862419CAD87BF082EB54C2294B3DEA3B81BCC85C93AAC64DB88181A50A
              Malicious:true
              Reputation:low
              Preview: .......H

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):7.4485585447335865
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              • Win32 Executable (generic) a (10002005/4) 49.78%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              File name:manager.exe
              File size:207360
              MD5:1479371ef0752f027661fc1b7748b318
              SHA1:3bf6809d0987cd82ec328b7bbdbcc5618743cf38
              SHA256:183923330057af95cedb73d0aa2e7f844dba89df8866995f483be4c5780298b3
              SHA512:cb10d09a5fc39acf2b799534900d0af2196df00123c6bbc485646960da69a0012d9423c60ae2d04687351fee52fc132c48bc62cc109f88588f766f9d977ce6f2
              SSDEEP:3072:gzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIi1fO32vT/T6BQ1bxjOhdiinvX:gLV6Bta6dtJmakIM5xfO32vTj19B+1
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................`........... ........@.. .....................................................................

              File Icon

              Icon Hash:00828e8e8686b000

              Static PE Info

              General

              Entrypoint:0x41e792
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
              DLL Characteristics:
              Time Stamp:0x54E927A1 [Sun Feb 22 00:49:37 2015 UTC]
              TLS Callbacks:
              CLR (.Net) Version:v2.0.50727
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

              Entrypoint Preview

              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1e7380x57.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x15da0.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x200000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000x1c7980x1c800False0.594512404057data6.59809023975IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .reloc0x200000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              .rsrc0x220000x15da00x15e00False0.999810267857data7.9978283616IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_RCDATA0x220580x15d48TIM image, Pixel at (65439,30114) Size=50258x8211

              Imports

              DLLImport
              mscoree.dll_CorExeMain

              Network Behavior

              Network Port Distribution

              TCP Packets

              TimestampSource PortDest PortSource IPDest IP
              Oct 1, 2021 09:46:33.840734959 CEST497534001192.168.2.637.0.10.38
              Oct 1, 2021 09:46:36.853905916 CEST497534001192.168.2.637.0.10.38
              Oct 1, 2021 09:46:42.854413033 CEST497534001192.168.2.637.0.10.38
              Oct 1, 2021 09:46:52.688483953 CEST497564001192.168.2.637.0.10.38
              Oct 1, 2021 09:46:55.839907885 CEST497564001192.168.2.637.0.10.38
              Oct 1, 2021 09:47:01.887850046 CEST497564001192.168.2.637.0.10.38
              Oct 1, 2021 09:47:11.117002010 CEST497894001192.168.2.637.0.10.38
              Oct 1, 2021 09:47:14.200654030 CEST497894001192.168.2.637.0.10.38
              Oct 1, 2021 09:47:20.201174974 CEST497894001192.168.2.637.0.10.38
              Oct 1, 2021 09:47:45.189544916 CEST498114001192.168.2.637.0.10.38
              Oct 1, 2021 09:47:48.203573942 CEST498114001192.168.2.637.0.10.38
              Oct 1, 2021 09:47:54.206561089 CEST498114001192.168.2.637.0.10.38
              Oct 1, 2021 09:48:03.043108940 CEST498584001192.168.2.637.0.10.38
              Oct 1, 2021 09:48:06.056700945 CEST498584001192.168.2.637.0.10.38
              Oct 1, 2021 09:48:12.057307005 CEST498584001192.168.2.637.0.10.38
              Oct 1, 2021 09:48:22.137379885 CEST498594001192.168.2.637.0.10.38
              Oct 1, 2021 09:48:25.152106047 CEST498594001192.168.2.637.0.10.38

              UDP Packets

              TimestampSource PortDest PortSource IPDest IP
              Oct 1, 2021 09:46:18.304255962 CEST5451353192.168.2.68.8.8.8
              Oct 1, 2021 09:46:18.421449900 CEST53545138.8.8.8192.168.2.6
              Oct 1, 2021 09:46:23.521905899 CEST6204453192.168.2.68.8.8.8
              Oct 1, 2021 09:46:23.664788961 CEST53620448.8.8.8192.168.2.6
              Oct 1, 2021 09:46:28.798232079 CEST6379153192.168.2.68.8.8.8
              Oct 1, 2021 09:46:28.815990925 CEST53637918.8.8.8192.168.2.6
              Oct 1, 2021 09:46:39.926908016 CEST6426753192.168.2.68.8.8.8
              Oct 1, 2021 09:46:39.946476936 CEST53642678.8.8.8192.168.2.6
              Oct 1, 2021 09:47:00.902137041 CEST4944853192.168.2.68.8.8.8
              Oct 1, 2021 09:47:00.921397924 CEST53494488.8.8.8192.168.2.6
              Oct 1, 2021 09:47:01.719419003 CEST6034253192.168.2.68.8.8.8
              Oct 1, 2021 09:47:01.808943987 CEST53603428.8.8.8192.168.2.6
              Oct 1, 2021 09:47:02.564899921 CEST6134653192.168.2.68.8.8.8
              Oct 1, 2021 09:47:02.637130022 CEST53613468.8.8.8192.168.2.6
              Oct 1, 2021 09:47:03.148363113 CEST5177453192.168.2.68.8.8.8
              Oct 1, 2021 09:47:03.171910048 CEST53517748.8.8.8192.168.2.6
              Oct 1, 2021 09:47:03.713520050 CEST5602353192.168.2.68.8.8.8
              Oct 1, 2021 09:47:03.727274895 CEST53560238.8.8.8192.168.2.6
              Oct 1, 2021 09:47:04.135634899 CEST5838453192.168.2.68.8.8.8
              Oct 1, 2021 09:47:04.146080971 CEST6026153192.168.2.68.8.8.8
              Oct 1, 2021 09:47:04.159434080 CEST53602618.8.8.8192.168.2.6
              Oct 1, 2021 09:47:04.166239023 CEST53583848.8.8.8192.168.2.6
              Oct 1, 2021 09:47:04.589643002 CEST5606153192.168.2.68.8.8.8
              Oct 1, 2021 09:47:04.655890942 CEST53560618.8.8.8192.168.2.6
              Oct 1, 2021 09:47:05.240114927 CEST5833653192.168.2.68.8.8.8
              Oct 1, 2021 09:47:05.253782034 CEST53583368.8.8.8192.168.2.6
              Oct 1, 2021 09:47:06.149307013 CEST5378153192.168.2.68.8.8.8
              Oct 1, 2021 09:47:06.163247108 CEST53537818.8.8.8192.168.2.6
              Oct 1, 2021 09:47:07.197725058 CEST5406453192.168.2.68.8.8.8
              Oct 1, 2021 09:47:07.211199045 CEST53540648.8.8.8192.168.2.6
              Oct 1, 2021 09:47:07.697747946 CEST5281153192.168.2.68.8.8.8
              Oct 1, 2021 09:47:07.711743116 CEST53528118.8.8.8192.168.2.6
              Oct 1, 2021 09:47:19.903994083 CEST5529953192.168.2.68.8.8.8
              Oct 1, 2021 09:47:19.922951937 CEST53552998.8.8.8192.168.2.6
              Oct 1, 2021 09:47:29.904046059 CEST6374553192.168.2.68.8.8.8
              Oct 1, 2021 09:47:29.917476892 CEST53637458.8.8.8192.168.2.6
              Oct 1, 2021 09:47:35.054523945 CEST5005553192.168.2.68.8.8.8
              Oct 1, 2021 09:47:35.066550970 CEST53500558.8.8.8192.168.2.6
              Oct 1, 2021 09:47:40.144175053 CEST6137453192.168.2.68.8.8.8
              Oct 1, 2021 09:47:40.157917023 CEST53613748.8.8.8192.168.2.6
              Oct 1, 2021 09:47:40.650233030 CEST5033953192.168.2.68.8.8.8
              Oct 1, 2021 09:47:40.668459892 CEST53503398.8.8.8192.168.2.6
              Oct 1, 2021 09:47:50.243451118 CEST6330753192.168.2.68.8.8.8
              Oct 1, 2021 09:47:50.256509066 CEST53633078.8.8.8192.168.2.6
              Oct 1, 2021 09:47:51.066883087 CEST4969453192.168.2.68.8.8.8
              Oct 1, 2021 09:47:51.080729961 CEST53496948.8.8.8192.168.2.6
              Oct 1, 2021 09:48:23.092674017 CEST5498253192.168.2.68.8.8.8
              Oct 1, 2021 09:48:23.121841908 CEST53549828.8.8.8192.168.2.6

              DNS Queries

              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              Oct 1, 2021 09:46:18.304255962 CEST192.168.2.68.8.8.80x6672Standard query (0)findmyservice.ignorelist.comA (IP address)IN (0x0001)
              Oct 1, 2021 09:46:23.521905899 CEST192.168.2.68.8.8.80x87ffStandard query (0)findmyservice.ignorelist.comA (IP address)IN (0x0001)
              Oct 1, 2021 09:46:28.798232079 CEST192.168.2.68.8.8.80x72d9Standard query (0)findmyservice.ignorelist.comA (IP address)IN (0x0001)
              Oct 1, 2021 09:47:29.904046059 CEST192.168.2.68.8.8.80x5557Standard query (0)findmyservice.ignorelist.comA (IP address)IN (0x0001)
              Oct 1, 2021 09:47:35.054523945 CEST192.168.2.68.8.8.80x94bfStandard query (0)findmyservice.ignorelist.comA (IP address)IN (0x0001)
              Oct 1, 2021 09:47:40.144175053 CEST192.168.2.68.8.8.80xdf6fStandard query (0)findmyservice.ignorelist.comA (IP address)IN (0x0001)

              DNS Answers

              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              Oct 1, 2021 09:46:18.421449900 CEST8.8.8.8192.168.2.60x6672No error (0)findmyservice.ignorelist.com127.0.0.2A (IP address)IN (0x0001)
              Oct 1, 2021 09:46:23.664788961 CEST8.8.8.8192.168.2.60x87ffNo error (0)findmyservice.ignorelist.com127.0.0.2A (IP address)IN (0x0001)
              Oct 1, 2021 09:46:28.815990925 CEST8.8.8.8192.168.2.60x72d9No error (0)findmyservice.ignorelist.com127.0.0.2A (IP address)IN (0x0001)
              Oct 1, 2021 09:47:29.917476892 CEST8.8.8.8192.168.2.60x5557No error (0)findmyservice.ignorelist.com127.0.0.2A (IP address)IN (0x0001)
              Oct 1, 2021 09:47:35.066550970 CEST8.8.8.8192.168.2.60x94bfNo error (0)findmyservice.ignorelist.com127.0.0.2A (IP address)IN (0x0001)
              Oct 1, 2021 09:47:40.157917023 CEST8.8.8.8192.168.2.60xdf6fNo error (0)findmyservice.ignorelist.com127.0.0.2A (IP address)IN (0x0001)

              Code Manipulations

              Statistics

              System Behavior

              General

              Start time:09:46:16
              Start date:01/10/2021
              Path:C:\Users\user\Desktop\manager.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\manager.exe'
              Imagebase:0x290000
              File size:207360 bytes
              MD5 hash:1479371EF0752F027661FC1B7748B318
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.613548998.0000000004E00000.00000004.00020000.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.613548998.0000000004E00000.00000004.00020000.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.613718440.00000000051B0000.00000004.00020000.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.613718440.00000000051B0000.00000004.00020000.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.613718440.00000000051B0000.00000004.00020000.sdmp, Author: Joe Security
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000000.341607342.0000000000292000.00000002.00020000.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000000.341607342.0000000000292000.00000002.00020000.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000000.00000000.341607342.0000000000292000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.609531824.0000000000292000.00000002.00020000.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.609531824.0000000000292000.00000002.00020000.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.609531824.0000000000292000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.612976062.0000000003A28000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.612976062.0000000003A28000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >