Loading ...

Play interactive tourEdit tour

Windows Analysis Report 6811A4CEA56365431B3799600303C945593A997E61968.exe

Overview

General Information

Sample Name:6811A4CEA56365431B3799600303C945593A997E61968.exe
Analysis ID:509016
MD5:b161113ed44310e65c3d704c0550d668
SHA1:b3a8d24f6b43c44e146dc808ee562c6e1d245c46
SHA256:6811a4cea56365431b3799600303c945593a997e619685d3e98889184cf458c2
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Machine Learning detection for sample
.NET source code contains potential unpacker
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Drops PE files
Detected TCP or UDP traffic on non-standard ports

Classification

Process Tree

  • System is w10x64
  • dhcpmon.exe (PID: 7096 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: B161113ED44310E65C3D704C0550D668)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "f211aa87-950c-4609-b635-0852d30e", "Group": "Default", "Domain1": "softtrim.hopto.org", "Domain2": "softtrim.hopto.org", "Port": 54984, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
6811A4CEA56365431B3799600303C945593A997E61968.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1018d:$x1: NanoCore.ClientPluginHost
  • 0x101ca:$x2: IClientNetworkHost
  • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
6811A4CEA56365431B3799600303C945593A997E61968.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xff05:$x1: NanoCore Client.exe
  • 0x1018d:$x2: NanoCore.ClientPluginHost
  • 0x117c6:$s1: PluginCommand
  • 0x117ba:$s2: FileCommand
  • 0x1266b:$s3: PipeExists
  • 0x18422:$s4: PipeCreated
  • 0x101b7:$s5: IClientLoggingHost
6811A4CEA56365431B3799600303C945593A997E61968.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    6811A4CEA56365431B3799600303C945593A997E61968.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfef5:$a: NanoCore
    • 0xff05:$a: NanoCore
    • 0x10139:$a: NanoCore
    • 0x1014d:$a: NanoCore
    • 0x1018d:$a: NanoCore
    • 0xff54:$b: ClientPlugin
    • 0x10156:$b: ClientPlugin
    • 0x10196:$b: ClientPlugin
    • 0x1007b:$c: ProjectData
    • 0x10a82:$d: DESCrypto
    • 0x1844e:$e: KeepAlive
    • 0x1643c:$g: LogClientMessage
    • 0x12637:$i: get_Connected
    • 0x10db8:$j: #=q
    • 0x10de8:$j: #=q
    • 0x10e04:$j: #=q
    • 0x10e34:$j: #=q
    • 0x10e50:$j: #=q
    • 0x10e6c:$j: #=q
    • 0x10e9c:$j: #=q
    • 0x10eb8:$j: #=q

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xff05:$x1: NanoCore Client.exe
    • 0x1018d:$x2: NanoCore.ClientPluginHost
    • 0x117c6:$s1: PluginCommand
    • 0x117ba:$s2: FileCommand
    • 0x1266b:$s3: PipeExists
    • 0x18422:$s4: PipeCreated
    • 0x101b7:$s5: IClientLoggingHost
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x1007b:$c: ProjectData
      • 0x10a82:$d: DESCrypto
      • 0x1844e:$e: KeepAlive
      • 0x1643c:$g: LogClientMessage
      • 0x12637:$i: get_Connected
      • 0x10db8:$j: #=q
      • 0x10de8:$j: #=q
      • 0x10e04:$j: #=q
      • 0x10e34:$j: #=q
      • 0x10e50:$j: #=q
      • 0x10e6c:$j: #=q
      • 0x10e9c:$j: #=q
      • 0x10eb8:$j: #=q

      Memory Dumps

      SourceRuleDescriptionAuthorStrings
      00000005.00000002.708062822.0000000003751000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        00000005.00000002.708062822.0000000003751000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0x23ba3:$a: NanoCore
        • 0x23bfc:$a: NanoCore
        • 0x23c39:$a: NanoCore
        • 0x23cb2:$a: NanoCore
        • 0x23c05:$b: ClientPlugin
        • 0x23c42:$b: ClientPlugin
        • 0x24540:$b: ClientPlugin
        • 0x2454d:$b: ClientPlugin
        • 0x1b3fe:$e: KeepAlive
        • 0x2408d:$g: LogClientMessage
        • 0x2400d:$i: get_Connected
        • 0x15bd5:$j: #=q
        • 0x15c05:$j: #=q
        • 0x15c41:$j: #=q
        • 0x15c69:$j: #=q
        • 0x15c99:$j: #=q
        • 0x15cc9:$j: #=q
        • 0x15cf9:$j: #=q
        • 0x15d29:$j: #=q
        • 0x15d45:$j: #=q
        • 0x15d75:$j: #=q
        00000005.00000002.708099328.0000000004751000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          00000005.00000002.708099328.0000000004751000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
          • 0x493ad:$a: NanoCore
          • 0x49406:$a: NanoCore
          • 0x49443:$a: NanoCore
          • 0x494bc:$a: NanoCore
          • 0x5cb67:$a: NanoCore
          • 0x5cb7c:$a: NanoCore
          • 0x5cbb1:$a: NanoCore
          • 0x75633:$a: NanoCore
          • 0x75648:$a: NanoCore
          • 0x7567d:$a: NanoCore
          • 0x4940f:$b: ClientPlugin
          • 0x4944c:$b: ClientPlugin
          • 0x49d4a:$b: ClientPlugin
          • 0x49d57:$b: ClientPlugin
          • 0x5c923:$b: ClientPlugin
          • 0x5c93e:$b: ClientPlugin
          • 0x5c96e:$b: ClientPlugin
          • 0x5cb85:$b: ClientPlugin
          • 0x5cbba:$b: ClientPlugin
          • 0x753ef:$b: ClientPlugin
          • 0x7540a:$b: ClientPlugin
          00000005.00000002.707589854.0000000000FC2000.00000002.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xff8d:$x1: NanoCore.ClientPluginHost
          • 0xffca:$x2: IClientNetworkHost
          • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          Click to see the 13 entries

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          5.2.dhcpmon.exe.479e404.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xd9ad:$x1: NanoCore.ClientPluginHost
          • 0xd9da:$x2: IClientNetworkHost
          5.2.dhcpmon.exe.479e404.3.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0xd9ad:$x2: NanoCore.ClientPluginHost
          • 0xea88:$s4: PipeCreated
          • 0xd9c7:$s5: IClientLoggingHost
          5.2.dhcpmon.exe.479e404.3.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
            5.2.dhcpmon.exe.3773dc4.1.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
            • 0xe75:$x1: NanoCore.ClientPluginHost
            • 0xe8f:$x2: IClientNetworkHost
            5.2.dhcpmon.exe.3773dc4.1.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
            • 0xe75:$x2: NanoCore.ClientPluginHost
            • 0x1261:$s3: PipeExists
            • 0x1136:$s4: PipeCreated
            • 0xeb0:$s5: IClientLoggingHost
            Click to see the 22 entries

            Sigma Overview

            AV Detection:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exe, ProcessId: 6692, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            E-Banking Fraud:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exe, ProcessId: 6692, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Stealing of Sensitive Information:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exe, ProcessId: 6692, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Remote Access Functionality:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exe, ProcessId: 6692, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 00000005.00000002.708062822.0000000003751000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "f211aa87-950c-4609-b635-0852d30e", "Group": "Default", "Domain1": "softtrim.hopto.org", "Domain2": "softtrim.hopto.org", "Port": 54984, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
            Multi AV Scanner detection for submitted fileShow sources
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exeVirustotal: Detection: 82%Perma Link
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exeMetadefender: Detection: 85%Perma Link
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exeReversingLabs: Detection: 100%
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exeAvira: detected
            Antivirus detection for dropped fileShow sources
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen7
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMetadefender: Detection: 85%Perma Link
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 100%
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, type: SAMPLE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.479e404.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.47a2a2d.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.479e404.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.47995ce.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.708062822.0000000003751000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.708099328.0000000004751000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.707589854.0000000000FC2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.668632002.0000000000CF2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.691691509.0000000000FC2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 6811A4CEA56365431B3799600303C945593A997E61968.exe PID: 6692, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 7096, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
            Machine Learning detection for sampleShow sources
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exeJoe Sandbox ML: detected
            Machine Learning detection for dropped fileShow sources
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
            Source: 5.2.dhcpmon.exe.fc0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 5.0.dhcpmon.exe.fc0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49752 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49753 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49754 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49755 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49756 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49759 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49760 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49761 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49762 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49790 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49802 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49809 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49811 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49834 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49837 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49838 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49840 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49841 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49842 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49843 -> 103.114.104.13:54984
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49844 -> 103.114.104.13:54984
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: softtrim.hopto.org
            Source: Joe Sandbox ViewASN Name: VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN
            Source: global trafficTCP traffic: 192.168.2.4:49752 -> 103.114.104.13:54984
            Source: unknownDNS traffic detected: queries for: softtrim.hopto.org
            Source: dhcpmon.exe, 00000005.00000002.708062822.0000000003751000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

            E-Banking Fraud:

            barindex
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, type: SAMPLE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.479e404.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.47a2a2d.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.479e404.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.47995ce.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.708062822.0000000003751000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.708099328.0000000004751000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.707589854.0000000000FC2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.668632002.0000000000CF2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.691691509.0000000000FC2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 6811A4CEA56365431B3799600303C945593A997E61968.exe PID: 6692, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 7096, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, type: SAMPLEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, type: SAMPLEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 5.2.dhcpmon.exe.479e404.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.2.dhcpmon.exe.3773dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.0.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.0.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 5.2.dhcpmon.exe.47a2a2d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 5.2.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.2.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 5.2.dhcpmon.exe.479e404.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.2.dhcpmon.exe.47995ce.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.2.dhcpmon.exe.47995ce.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000005.00000002.708062822.0000000003751000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000005.00000002.708099328.0000000004751000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000005.00000002.707589854.0000000000FC2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000005.00000002.707589854.0000000000FC2000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000000.668632002.0000000000CF2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000000.00000000.668632002.0000000000CF2000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000005.00000000.691691509.0000000000FC2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000005.00000000.691691509.0000000000FC2000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: 6811A4CEA56365431B3799600303C945593A997E61968.exe PID: 6692, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: 6811A4CEA56365431B3799600303C945593A997E61968.exe PID: 6692, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: dhcpmon.exe PID: 7096, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, type: SAMPLEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, type: SAMPLEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, type: SAMPLEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 5.2.dhcpmon.exe.479e404.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.dhcpmon.exe.479e404.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 5.2.dhcpmon.exe.3773dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.dhcpmon.exe.3773dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 5.0.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.0.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 5.0.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 5.2.dhcpmon.exe.47a2a2d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.dhcpmon.exe.47a2a2d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 5.2.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 5.2.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 5.2.dhcpmon.exe.479e404.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.dhcpmon.exe.479e404.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 5.2.dhcpmon.exe.47995ce.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.dhcpmon.exe.47995ce.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 5.2.dhcpmon.exe.47995ce.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000005.00000002.708062822.0000000003751000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000005.00000002.708099328.0000000004751000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000005.00000002.707589854.0000000000FC2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000005.00000002.707589854.0000000000FC2000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000000.00000000.668632002.0000000000CF2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000000.00000000.668632002.0000000000CF2000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000005.00000000.691691509.0000000000FC2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000005.00000000.691691509.0000000000FC2000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: 6811A4CEA56365431B3799600303C945593A997E61968.exe PID: 6692, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: 6811A4CEA56365431B3799600303C945593A997E61968.exe PID: 6692, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: dhcpmon.exe PID: 7096, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_00FC524A
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_058F2FA8
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_058F23A0
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_058F3850
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_058F306F
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exeStatic PE information: Section: .rsrc ZLIB complexity 0.999553571429
            Source: dhcpmon.exe.0.drStatic PE information: Section: .rsrc ZLIB complexity 0.999553571429
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exeVirustotal: Detection: 82%
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exeMetadefender: Detection: 85%
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exeReversingLabs: Detection: 100%
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeFile read: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeJump to behavior
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exe 'C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exe'
            Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeFile created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9AJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@21/1
            Source: 5.0.dhcpmon.exe.fc0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 5.0.dhcpmon.exe.fc0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 5.2.dhcpmon.exe.fc0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 5.2.dhcpmon.exe.fc0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exeJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{f211aa87-950c-4609-b635-0852d30ee9e9}
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
            Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: dhcpmon.exe.0.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
            Source: dhcpmon.exe.0.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR

            Data Obfuscation:

            barindex
            .NET source code contains potential unpackerShow sources
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: dhcpmon.exe.0.dr, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 5.2.dhcpmon.exe.fc0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 5.2.dhcpmon.exe.fc0000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 5.0.dhcpmon.exe.fc0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 5.0.dhcpmon.exe.fc0000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: dhcpmon.exe.0.dr, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: dhcpmon.exe.0.dr, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 5.2.dhcpmon.exe.fc0000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 5.2.dhcpmon.exe.fc0000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 5.0.dhcpmon.exe.fc0000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 5.0.dhcpmon.exe.fc0000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeFile opened: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exe:Zone.Identifier read attributes | delete
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exe TID: 6772Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exe TID: 6760Thread sleep time: -700000s >= -30000s
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 7124Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeWindow / User API: foregroundWindowGot 957
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeMemory allocated: page read and write | page guard
            Source: C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, type: SAMPLE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.479e404.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.47a2a2d.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.479e404.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.47995ce.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.708062822.0000000003751000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.708099328.0000000004751000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.707589854.0000000000FC2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.668632002.0000000000CF2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.691691509.0000000000FC2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 6811A4CEA56365431B3799600303C945593A997E61968.exe PID: 6692, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 7096, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED

            Remote Access Functionality:

            barindex
            Detected Nanocore RatShow sources
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, 00000000.00000000.668632002.0000000000CF2000.00000002.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exeString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 00000005.00000002.708062822.0000000003751000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: 6811A4CEA56365431B3799600303C945593A997E61968.exeString found in binary or memory: NanoCore.ClientPluginHost
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: 6811A4CEA56365431B3799600303C945593A997E61968.exe, type: SAMPLE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.479e404.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.47a2a2d.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.fc0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.479e404.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.47995ce.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.708062822.0000000003751000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.708099328.0000000004751000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.707589854.0000000000FC2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.668632002.0000000000CF2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.691691509.0000000000FC2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 6811A4CEA56365431B3799600303C945593A997E61968.exe PID: 6692, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 7096, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading2Input Capture11Security Software Discovery1Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery1Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Information Discovery2SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing12DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

            Behavior Graph

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            6811A4CEA56365431B3799600303C945593A997E61968.exe83%VirustotalBrowse
            6811A4CEA56365431B3799600303C945593A997E61968.exe86%MetadefenderBrowse
            6811A4CEA56365431B3799600303C945593A997E61968.exe100%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
            6811A4CEA56365431B3799600303C945593A997E61968.exe100%AviraTR/Dropper.MSIL.Gen7
            6811A4CEA56365431B3799600303C945593A997E61968.exe100%Joe Sandbox ML

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%AviraTR/Dropper.MSIL.Gen7
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe86%MetadefenderBrowse
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%ReversingLabsByteCode-MSIL.Backdoor.NanoCore

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            5.2.dhcpmon.exe.fc0000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            5.0.dhcpmon.exe.fc0000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            0.0.6811A4CEA56365431B3799600303C945593A997E61968.exe.cf0000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

            Domains

            SourceDetectionScannerLabelLink
            softtrim.hopto.org3%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            softtrim.hopto.org3%VirustotalBrowse
            softtrim.hopto.org0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            softtrim.hopto.org
            103.114.104.13
            truetrueunknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            softtrim.hopto.orgtrue
            • 3%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            103.114.104.13
            softtrim.hopto.orgViet Nam
            135905VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVNtrue

            General Information

            Joe Sandbox Version:33.0.0 White Diamond
            Analysis ID:509016
            Start date:25.10.2021
            Start time:22:05:34
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 6m 58s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:6811A4CEA56365431B3799600303C945593A997E61968.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:16
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@2/5@21/1
            EGA Information:Failed
            HDC Information:Failed
            HCA Information:
            • Successful, ratio: 98%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            Warnings:
            Show All
            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
            • TCP Packets have been reduced to 100
            • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
            • Excluded IPs from analysis (whitelisted): 23.211.6.115, 20.82.210.154, 52.251.79.25, 40.112.88.60, 20.54.110.249, 80.67.82.235, 80.67.82.211
            • Excluded domains from analysis (whitelisted): displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, consumer-displaycatalogrp-aks2aks-useast.md.mp.microsoft.com.akadns.net, eus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, displaycatalog-rp-useast.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net

            Simulations

            Behavior and APIs

            TimeTypeDescription
            22:06:34API Interceptor1046x Sleep call for process: 6811A4CEA56365431B3799600303C945593A997E61968.exe modified
            22:06:34AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            No context

            ASN

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVNKfvEoN0wIwGet hashmaliciousBrowse
            • 103.68.250.127
            INQ_42-4I090.xlsxGet hashmaliciousBrowse
            • 103.125.190.6
            PO doc 42782.xlsxGet hashmaliciousBrowse
            • 103.125.190.6
            b2ZeLApyX2.exeGet hashmaliciousBrowse
            • 103.133.109.121
            Purchase order_122.docGet hashmaliciousBrowse
            • 103.133.109.121
            DMS210949 MV LYDERHORN LOW MIX RATIO.xlsxGet hashmaliciousBrowse
            • 180.214.239.85
            payment issue need help.exeGet hashmaliciousBrowse
            • 103.133.110.241
            DMS210949 MV LYDERHORN LOW MIX RATIO.xlsxGet hashmaliciousBrowse
            • 180.214.239.85
            PO1-424480.xlsxGet hashmaliciousBrowse
            • 103.125.190.6
            arm7Get hashmaliciousBrowse
            • 14.225.246.61
            PI Alu Circle_Dt. 14.05.2021.xlsxGet hashmaliciousBrowse
            • 180.214.239.85
            YKr3m9a7C3.exeGet hashmaliciousBrowse
            • 103.133.109.121
            SWIFT COPY.docGet hashmaliciousBrowse
            • 103.133.109.121
            Airway bill# 7899865792021.xlsxGet hashmaliciousBrowse
            • 103.125.190.6
            presupuesto.xlsxGet hashmaliciousBrowse
            • 103.140.251.116
            Purchase orders with bank details.ppaGet hashmaliciousBrowse
            • 103.141.138.110
            ZHANGZHOU YIHANSHENG HOUSEWARES.xlsxGet hashmaliciousBrowse
            • 180.214.239.85
            PO 4910007391 CHANGZHOU.xlsxGet hashmaliciousBrowse
            • 180.214.239.85
            EDG.exeGet hashmaliciousBrowse
            • 103.125.189.85
            presupuesto.xlsxGet hashmaliciousBrowse
            • 103.140.251.116

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
            Process:C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):207360
            Entropy (8bit):7.44852041350859
            Encrypted:false
            SSDEEP:3072:QzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIrqskdn+BJCnryIwzt4LLOcsK:QLV6Bta6dtJmakIM5rskxrgztsLPJ
            MD5:B161113ED44310E65C3D704C0550D668
            SHA1:B3A8D24F6B43C44E146DC808EE562C6E1D245C46
            SHA-256:6811A4CEA56365431B3799600303C945593A997E619685D3E98889184CF458C2
            SHA-512:E47D75C508E8E50A393CC4929D36AF9CD58EF62CAB4E64A8E2CC942AF47A61461ACBD3EE28D9DDB4EAFDD3882DFE8AB85A0D07BBF4A696E0EF24F97AD793AC47
            Malicious:true
            Yara Hits:
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Metadefender, Detection: 86%, Browse
            • Antivirus: ReversingLabs, Detection: 100%
            Reputation:low
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................`........... ........@.. ......................................................................8...W.... ...]........................................................................... ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc....]... ...^..................@..@................t.......H...........T............................................................0..Q........o5.......*.o6....-.&......3+..+.... ....3......1..... 2.... ....3.... .......*.*....0..E.......s7....-(&s8....-&&s9....,$&s:........s;........*.....+.....+.....+.....0..........~....o<...*..0..........~....o=...*..0..........~....o>...*..0..........~....o?...*..0..........~....o@...*..0.............-.&(A...*&+...0..$.......~B........-.(...+.-.&+..B...+.~B...*.0.............-.&(A...*&+...0..
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
            Process:C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:true
            Reputation:high, very likely benign file
            Preview: [ZoneTransfer]....ZoneId=0
            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):525
            Entropy (8bit):5.2874233355119316
            Encrypted:false
            SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
            MD5:61CCF53571C9ABA6511D696CB0D32E45
            SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
            SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
            SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
            Malicious:true
            Reputation:high, very likely benign file
            Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
            Process:C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exe
            File Type:data
            Category:modified
            Size (bytes):216
            Entropy (8bit):7.012278113302776
            Encrypted:false
            SSDEEP:6:X4LDAnybgCFgwOp7Lr8gVyTwvMV84Miuk:X4LEnybgCF7wHJyCe8Oh
            MD5:0FA1BE38A5A8D2A56F48982C3E9142A6
            SHA1:28E5B087E687E57D4AB6DB352A493AA5657C8484
            SHA-256:4CFA0E50D93A65C81B5CF800F4970E7AD0F7324E0220D1EE91B27D0C0F289493
            SHA-512:F50CA947DCB4F673FADFB6C5F1D9B0FD541679AFD6A03B14719789288A646C4C1762F3E89B8A01B3A87420FDA802B21E5FA109F1FF088898607552172298D83A
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h.P.vY.........S.5.6.C4..E.Y.|........).zs...w.gl..\.G..J.M.vES.0....P.:..6...T....+5.1............r.P.V..+..(.*2d.f... ..q.. 7iO.+..c.....!.'.*..mL|X
            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
            Process:C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exe
            File Type:data
            Category:dropped
            Size (bytes):8
            Entropy (8bit):2.75
            Encrypted:false
            SSDEEP:3:0y8t:0y8t
            MD5:F98377D310EC6DC16324DCDF628F9628
            SHA1:D3E58FB49FE5E1BE75A8356E1763C36391DED0C4
            SHA-256:44273650DD3C838A88FE11FEB533A8778DBEDEDC6A25CD961274E8E25740189D
            SHA-512:ADB81018AB005FB722DF148415B80A16A761BE8FA538CF4429B05189236A51F28B223A3DB02FB611247CE6459201915BD23C485A3F73202BC83730E65A1B373D
            Malicious:true
            Reputation:low
            Preview: ......H

            Static File Info

            General

            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Entropy (8bit):7.44852041350859
            TrID:
            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            • Win32 Executable (generic) a (10002005/4) 49.78%
            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
            • Generic Win/DOS Executable (2004/3) 0.01%
            • DOS Executable Generic (2002/1) 0.01%
            File name:6811A4CEA56365431B3799600303C945593A997E61968.exe
            File size:207360
            MD5:b161113ed44310e65c3d704c0550d668
            SHA1:b3a8d24f6b43c44e146dc808ee562c6e1d245c46
            SHA256:6811a4cea56365431b3799600303c945593a997e619685d3e98889184cf458c2
            SHA512:e47d75c508e8e50a393cc4929d36af9cd58ef62cab4e64a8e2cc942af47a61461acbd3ee28d9ddb4eafdd3882dfe8ab85a0d07bbf4a696e0ef24f97ad793ac47
            SSDEEP:3072:QzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIrqskdn+BJCnryIwzt4LLOcsK:QLV6Bta6dtJmakIM5rskxrgztsLPJ
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................`........... ........@.. .....................................................................

            File Icon

            Icon Hash:00828e8e8686b000

            Static PE Info

            General

            Entrypoint:0x41e792
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            DLL Characteristics:
            Time Stamp:0x54E927A1 [Sun Feb 22 00:49:37 2015 UTC]
            TLS Callbacks:
            CLR (.Net) Version:v2.0.50727
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

            Entrypoint Preview

            Instruction
            jmp dword ptr [00402000h]
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al

            Data Directories

            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x1e7380x57.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x15d88.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x200000xc.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

            Sections

            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x20000x1c7980x1c800False0.594520970395data6.59808518096IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .reloc0x200000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            .rsrc0x220000x15d880x15e00False0.999553571429data7.99778830588IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

            Resources

            NameRVASizeTypeLanguageCountry
            RT_RCDATA0x220580x15d30TIM image, (24595,53676)

            Imports

            DLLImport
            mscoree.dll_CorExeMain

            Network Behavior

            Snort IDS Alerts

            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
            10/25/21-22:06:36.007895UDP254DNS SPOOF query response with TTL of 1 min. and no authority53497148.8.8.8192.168.2.4
            10/25/21-22:06:36.511244TCP2025019ET TROJAN Possible NanoCore C2 60B4975254984192.168.2.4103.114.104.13
            10/25/21-22:06:42.509658UDP254DNS SPOOF query response with TTL of 1 min. and no authority53580288.8.8.8192.168.2.4
            10/25/21-22:06:42.826284TCP2025019ET TROJAN Possible NanoCore C2 60B4975354984192.168.2.4103.114.104.13
            10/25/21-22:06:47.847058UDP254DNS SPOOF query response with TTL of 1 min. and no authority53530978.8.8.8192.168.2.4
            10/25/21-22:06:48.143374TCP2025019ET TROJAN Possible NanoCore C2 60B4975454984192.168.2.4103.114.104.13
            10/25/21-22:06:55.592076TCP2025019ET TROJAN Possible NanoCore C2 60B4975554984192.168.2.4103.114.104.13
            10/25/21-22:07:00.374123UDP254DNS SPOOF query response with TTL of 1 min. and no authority53623898.8.8.8192.168.2.4
            10/25/21-22:07:00.676570TCP2025019ET TROJAN Possible NanoCore C2 60B4975654984192.168.2.4103.114.104.13
            10/25/21-22:07:07.144852UDP254DNS SPOOF query response with TTL of 1 min. and no authority53558548.8.8.8192.168.2.4
            10/25/21-22:07:07.649118TCP2025019ET TROJAN Possible NanoCore C2 60B4975954984192.168.2.4103.114.104.13
            10/25/21-22:07:14.098647TCP2025019ET TROJAN Possible NanoCore C2 60B4976054984192.168.2.4103.114.104.13
            10/25/21-22:07:19.187429TCP2025019ET TROJAN Possible NanoCore C2 60B4976154984192.168.2.4103.114.104.13
            10/25/21-22:07:26.936182TCP2025019ET TROJAN Possible NanoCore C2 60B4976254984192.168.2.4103.114.104.13
            10/25/21-22:07:33.666216TCP2025019ET TROJAN Possible NanoCore C2 60B4979054984192.168.2.4103.114.104.13
            10/25/21-22:07:39.129307TCP2025019ET TROJAN Possible NanoCore C2 60B4980254984192.168.2.4103.114.104.13
            10/25/21-22:07:45.244092UDP254DNS SPOOF query response with TTL of 1 min. and no authority53496128.8.8.8192.168.2.4
            10/25/21-22:07:45.548411TCP2025019ET TROJAN Possible NanoCore C2 60B4980954984192.168.2.4103.114.104.13
            10/25/21-22:07:52.177600TCP2025019ET TROJAN Possible NanoCore C2 60B4981154984192.168.2.4103.114.104.13
            10/25/21-22:07:57.887573TCP2025019ET TROJAN Possible NanoCore C2 60B4983454984192.168.2.4103.114.104.13
            10/25/21-22:08:04.610691UDP254DNS SPOOF query response with TTL of 1 min. and no authority53608758.8.8.8192.168.2.4
            10/25/21-22:08:04.907955TCP2025019ET TROJAN Possible NanoCore C2 60B4983754984192.168.2.4103.114.104.13
            10/25/21-22:08:11.562943TCP2025019ET TROJAN Possible NanoCore C2 60B4983854984192.168.2.4103.114.104.13
            10/25/21-22:08:18.116716UDP254DNS SPOOF query response with TTL of 1 min. and no authority53624208.8.8.8192.168.2.4
            10/25/21-22:08:18.527714TCP2025019ET TROJAN Possible NanoCore C2 60B4984054984192.168.2.4103.114.104.13
            10/25/21-22:08:23.443831UDP254DNS SPOOF query response with TTL of 1 min. and no authority53605798.8.8.8192.168.2.4
            10/25/21-22:08:23.762006TCP2025019ET TROJAN Possible NanoCore C2 60B4984154984192.168.2.4103.114.104.13
            10/25/21-22:08:28.710325TCP2025019ET TROJAN Possible NanoCore C2 60B4984254984192.168.2.4103.114.104.13
            10/25/21-22:08:34.917022TCP2025019ET TROJAN Possible NanoCore C2 60B4984354984192.168.2.4103.114.104.13
            10/25/21-22:08:39.747411TCP2025019ET TROJAN Possible NanoCore C2 60B4984454984192.168.2.4103.114.104.13

            Network Port Distribution

            TCP Packets

            TimestampSource PortDest PortSource IPDest IP
            Oct 25, 2021 22:06:36.043786049 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:36.345477104 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:36.345583916 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:36.511244059 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:36.847208023 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:36.847352028 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:37.192291021 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:37.192390919 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:37.493859053 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:37.493969917 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:37.836527109 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:37.836648941 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.179373026 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.179480076 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.186619043 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.186655045 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.186693907 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.186728954 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.186759949 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.186808109 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.186922073 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.186966896 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.187072992 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.187134027 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.187264919 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.187310934 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.187325001 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.187366962 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.187602043 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.187654018 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.187788963 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.187834978 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.187915087 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.187958002 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.236675978 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.488034964 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.488058090 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.488112926 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.488120079 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.488145113 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.488164902 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.488255978 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.488272905 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.488292933 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.488302946 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.488311052 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.488327026 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.488343000 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.488353014 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.488360882 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.488375902 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.488390923 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.488393068 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.488409042 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.488423109 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.488429070 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.488445997 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.488454103 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.488461971 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.488481045 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.488516092 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.489005089 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.489023924 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.489039898 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.489062071 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.489087105 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:38.489113092 CEST5498449752103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:38.489154100 CEST4975254984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:42.539032936 CEST4975354984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:42.825650930 CEST5498449753103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:42.825834036 CEST4975354984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:42.826283932 CEST4975354984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:43.116664886 CEST5498449753103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:43.116818905 CEST4975354984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:43.299132109 CEST4975354984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:43.404557943 CEST5498449753103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:43.407006979 CEST4975354984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:47.851002932 CEST4975454984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:48.142461061 CEST5498449754103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:48.142601967 CEST4975454984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:48.143373966 CEST4975454984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:48.458391905 CEST5498449754103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:48.459763050 CEST4975454984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:48.800981998 CEST5498449754103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:48.801420927 CEST4975454984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:49.093135118 CEST5498449754103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:49.093281031 CEST4975454984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:49.435080051 CEST5498449754103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:49.435328960 CEST4975454984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:49.780508041 CEST5498449754103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:49.780725002 CEST4975454984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:49.784373045 CEST5498449754103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:49.784477949 CEST4975454984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:49.784651995 CEST5498449754103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:49.784714937 CEST4975454984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:49.784794092 CEST5498449754103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:49.784845114 CEST4975454984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:49.784873962 CEST5498449754103.114.104.13192.168.2.4
            Oct 25, 2021 22:06:49.784923077 CEST4975454984192.168.2.4103.114.104.13
            Oct 25, 2021 22:06:49.784970999 CEST5498449754103.114.104.13192.168.2.4

            UDP Packets

            TimestampSource PortDest PortSource IPDest IP
            Oct 25, 2021 22:06:35.987584114 CEST4971453192.168.2.48.8.8.8
            Oct 25, 2021 22:06:36.007894993 CEST53497148.8.8.8192.168.2.4
            Oct 25, 2021 22:06:42.489492893 CEST5802853192.168.2.48.8.8.8
            Oct 25, 2021 22:06:42.509658098 CEST53580288.8.8.8192.168.2.4
            Oct 25, 2021 22:06:47.826697111 CEST5309753192.168.2.48.8.8.8
            Oct 25, 2021 22:06:47.847058058 CEST53530978.8.8.8192.168.2.4
            Oct 25, 2021 22:06:55.279752970 CEST4925753192.168.2.48.8.8.8
            Oct 25, 2021 22:06:55.298108101 CEST53492578.8.8.8192.168.2.4
            Oct 25, 2021 22:07:00.353631973 CEST6238953192.168.2.48.8.8.8
            Oct 25, 2021 22:07:00.374123096 CEST53623898.8.8.8192.168.2.4
            Oct 25, 2021 22:07:07.123862028 CEST5585453192.168.2.48.8.8.8
            Oct 25, 2021 22:07:07.144851923 CEST53558548.8.8.8192.168.2.4
            Oct 25, 2021 22:07:13.780889988 CEST6454953192.168.2.48.8.8.8
            Oct 25, 2021 22:07:13.799364090 CEST53645498.8.8.8192.168.2.4
            Oct 25, 2021 22:07:18.852138996 CEST6315353192.168.2.48.8.8.8
            Oct 25, 2021 22:07:18.870820045 CEST53631538.8.8.8192.168.2.4
            Oct 25, 2021 22:07:26.623488903 CEST5299153192.168.2.48.8.8.8
            Oct 25, 2021 22:07:26.642057896 CEST53529918.8.8.8192.168.2.4
            Oct 25, 2021 22:07:33.347064972 CEST6172153192.168.2.48.8.8.8
            Oct 25, 2021 22:07:33.365216017 CEST53617218.8.8.8192.168.2.4
            Oct 25, 2021 22:07:38.776997089 CEST5233753192.168.2.48.8.8.8
            Oct 25, 2021 22:07:38.795952082 CEST53523378.8.8.8192.168.2.4
            Oct 25, 2021 22:07:45.222021103 CEST4961253192.168.2.48.8.8.8
            Oct 25, 2021 22:07:45.244091988 CEST53496128.8.8.8192.168.2.4
            Oct 25, 2021 22:07:51.861092091 CEST4928553192.168.2.48.8.8.8
            Oct 25, 2021 22:07:51.879596949 CEST53492858.8.8.8192.168.2.4
            Oct 25, 2021 22:07:57.557805061 CEST5060153192.168.2.48.8.8.8
            Oct 25, 2021 22:07:57.576284885 CEST53506018.8.8.8192.168.2.4
            Oct 25, 2021 22:08:04.590718031 CEST6087553192.168.2.48.8.8.8
            Oct 25, 2021 22:08:04.610691071 CEST53608758.8.8.8192.168.2.4
            Oct 25, 2021 22:08:11.214294910 CEST5644853192.168.2.48.8.8.8
            Oct 25, 2021 22:08:11.231417894 CEST53564488.8.8.8192.168.2.4
            Oct 25, 2021 22:08:18.096024036 CEST6242053192.168.2.48.8.8.8
            Oct 25, 2021 22:08:18.116715908 CEST53624208.8.8.8192.168.2.4
            Oct 25, 2021 22:08:23.425092936 CEST6057953192.168.2.48.8.8.8
            Oct 25, 2021 22:08:23.443830967 CEST53605798.8.8.8192.168.2.4
            Oct 25, 2021 22:08:28.372742891 CEST5018353192.168.2.48.8.8.8
            Oct 25, 2021 22:08:28.391436100 CEST53501838.8.8.8192.168.2.4
            Oct 25, 2021 22:08:34.610171080 CEST6153153192.168.2.48.8.8.8
            Oct 25, 2021 22:08:34.628686905 CEST53615318.8.8.8192.168.2.4
            Oct 25, 2021 22:08:39.435587883 CEST4922853192.168.2.48.8.8.8
            Oct 25, 2021 22:08:39.454092026 CEST53492288.8.8.8192.168.2.4

            DNS Queries

            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
            Oct 25, 2021 22:06:35.987584114 CEST192.168.2.48.8.8.80xa334Standard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:06:42.489492893 CEST192.168.2.48.8.8.80x2d6dStandard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:06:47.826697111 CEST192.168.2.48.8.8.80xa9f3Standard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:06:55.279752970 CEST192.168.2.48.8.8.80xfc29Standard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:07:00.353631973 CEST192.168.2.48.8.8.80xd831Standard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:07:07.123862028 CEST192.168.2.48.8.8.80x8f51Standard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:07:13.780889988 CEST192.168.2.48.8.8.80x101fStandard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:07:18.852138996 CEST192.168.2.48.8.8.80x194Standard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:07:26.623488903 CEST192.168.2.48.8.8.80x574bStandard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:07:33.347064972 CEST192.168.2.48.8.8.80xc73aStandard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:07:38.776997089 CEST192.168.2.48.8.8.80xd89dStandard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:07:45.222021103 CEST192.168.2.48.8.8.80xec6bStandard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:07:51.861092091 CEST192.168.2.48.8.8.80x8d6eStandard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:07:57.557805061 CEST192.168.2.48.8.8.80x51f9Standard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:08:04.590718031 CEST192.168.2.48.8.8.80x9ca2Standard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:08:11.214294910 CEST192.168.2.48.8.8.80x1080Standard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:08:18.096024036 CEST192.168.2.48.8.8.80xee42Standard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:08:23.425092936 CEST192.168.2.48.8.8.80x9b5dStandard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:08:28.372742891 CEST192.168.2.48.8.8.80x9238Standard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:08:34.610171080 CEST192.168.2.48.8.8.80x6c77Standard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)
            Oct 25, 2021 22:08:39.435587883 CEST192.168.2.48.8.8.80x325aStandard query (0)softtrim.hopto.orgA (IP address)IN (0x0001)

            DNS Answers

            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
            Oct 25, 2021 22:06:36.007894993 CEST8.8.8.8192.168.2.40xa334No error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:06:42.509658098 CEST8.8.8.8192.168.2.40x2d6dNo error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:06:47.847058058 CEST8.8.8.8192.168.2.40xa9f3No error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:06:55.298108101 CEST8.8.8.8192.168.2.40xfc29No error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:07:00.374123096 CEST8.8.8.8192.168.2.40xd831No error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:07:07.144851923 CEST8.8.8.8192.168.2.40x8f51No error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:07:13.799364090 CEST8.8.8.8192.168.2.40x101fNo error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:07:18.870820045 CEST8.8.8.8192.168.2.40x194No error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:07:26.642057896 CEST8.8.8.8192.168.2.40x574bNo error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:07:33.365216017 CEST8.8.8.8192.168.2.40xc73aNo error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:07:38.795952082 CEST8.8.8.8192.168.2.40xd89dNo error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:07:45.244091988 CEST8.8.8.8192.168.2.40xec6bNo error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:07:51.879596949 CEST8.8.8.8192.168.2.40x8d6eNo error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:07:57.576284885 CEST8.8.8.8192.168.2.40x51f9No error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:08:04.610691071 CEST8.8.8.8192.168.2.40x9ca2No error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:08:11.231417894 CEST8.8.8.8192.168.2.40x1080No error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:08:18.116715908 CEST8.8.8.8192.168.2.40xee42No error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:08:23.443830967 CEST8.8.8.8192.168.2.40x9b5dNo error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:08:28.391436100 CEST8.8.8.8192.168.2.40x9238No error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:08:34.628686905 CEST8.8.8.8192.168.2.40x6c77No error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)
            Oct 25, 2021 22:08:39.454092026 CEST8.8.8.8192.168.2.40x325aNo error (0)softtrim.hopto.org103.114.104.13A (IP address)IN (0x0001)

            Code Manipulations

            Statistics

            Behavior

            Click to jump to process

            System Behavior

            General

            Start time:22:06:32
            Start date:25/10/2021
            Path:C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\Desktop\6811A4CEA56365431B3799600303C945593A997E61968.exe'
            Imagebase:0xcf0000
            File size:207360 bytes
            MD5 hash:B161113ED44310E65C3D704C0550D668
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000000.668632002.0000000000CF2000.00000002.00020000.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000000.668632002.0000000000CF2000.00000002.00020000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000000.00000000.668632002.0000000000CF2000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            Reputation:low

            General

            Start time:22:06:43
            Start date:25/10/2021
            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
            Wow64 process (32bit):true
            Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
            Imagebase:0xfc0000
            File size:207360 bytes
            MD5 hash:B161113ED44310E65C3D704C0550D668
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.708062822.0000000003751000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.708062822.0000000003751000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.708099328.0000000004751000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.708099328.0000000004751000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.707589854.0000000000FC2000.00000002.00020000.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.707589854.0000000000FC2000.00000002.00020000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.707589854.0000000000FC2000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000000.691691509.0000000000FC2000.00000002.00020000.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000000.691691509.0000000000FC2000.00000002.00020000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000005.00000000.691691509.0000000000FC2000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
            Antivirus matches:
            • Detection: 100%, Avira
            • Detection: 100%, Joe Sandbox ML
            • Detection: 86%, Metadefender, Browse
            • Detection: 100%, ReversingLabs
            Reputation:low

            Disassembly

            Code Analysis

            Reset < >