Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe

Overview

General Information

Sample Name:8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
Analysis ID:624876
MD5:df1dc1a245d93014003e9ecc4f654602
SHA1:b2f5da6a917d9535a623de61c603d03f0d225fb4
SHA256:8fa3b2eb7650ac7ff7dbbeed506e3f17b805d64d6932715f8885508fb6f988c6
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Machine Learning detection for sample
.NET source code contains potential unpacker
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe (PID: 6408 cmdline: "C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe" MD5: DF1DC1A245D93014003E9ECC4F654602)
    • schtasks.exe (PID: 6448 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp187C.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 6544 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp21A4.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6776 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: DF1DC1A245D93014003E9ECC4F654602)
  • dhcpmon.exe (PID: 6860 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: DF1DC1A245D93014003E9ECC4F654602)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "3577d152-ce3c-4012-b95b-9d207c3b", "Group": "Default", "Domain1": "khalil3131.ddns.net", "Domain2": "127.0.0.1", "Port": 1991, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Enable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1018d:$x1: NanoCore.ClientPluginHost
  • 0x101ca:$x2: IClientNetworkHost
  • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xff05:$x1: NanoCore Client.exe
  • 0x1018d:$x2: NanoCore.ClientPluginHost
  • 0x117c6:$s1: PluginCommand
  • 0x117ba:$s2: FileCommand
  • 0x1266b:$s3: PipeExists
  • 0x18422:$s4: PipeCreated
  • 0x101b7:$s5: IClientLoggingHost
8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0xfef5:$x1: NanoCore Client
    • 0xff05:$x1: NanoCore Client
    • 0x1014d:$x2: NanoCore.ClientPlugin
    • 0x1018d:$x3: NanoCore.ClientPluginHost
    • 0x10142:$i1: IClientApp
    • 0x10163:$i2: IClientData
    • 0x1016f:$i3: IClientNetwork
    • 0x1017e:$i4: IClientAppHost
    • 0x101a7:$i5: IClientDataHost
    • 0x101b7:$i6: IClientLoggingHost
    • 0x101ca:$i7: IClientNetworkHost
    • 0x101dd:$i8: IClientUIHost
    • 0x101eb:$i9: IClientNameObjectCollection
    • 0x10207:$i10: IClientReadOnlyNameObjectCollection
    • 0xff54:$s1: ClientPlugin
    • 0x10156:$s1: ClientPlugin
    • 0x1064a:$s2: EndPoint
    • 0x10653:$s3: IPAddress
    • 0x1065d:$s4: IPEndPoint
    • 0x12093:$s6: get_ClientSettings
    • 0x12637:$s7: get_Connected
    8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfef5:$a: NanoCore
    • 0xff05:$a: NanoCore
    • 0x10139:$a: NanoCore
    • 0x1014d:$a: NanoCore
    • 0x1018d:$a: NanoCore
    • 0xff54:$b: ClientPlugin
    • 0x10156:$b: ClientPlugin
    • 0x10196:$b: ClientPlugin
    • 0x1007b:$c: ProjectData
    • 0x10a82:$d: DESCrypto
    • 0x1844e:$e: KeepAlive
    • 0x1643c:$g: LogClientMessage
    • 0x12637:$i: get_Connected
    • 0x10db8:$j: #=q
    • 0x10de8:$j: #=q
    • 0x10e04:$j: #=q
    • 0x10e34:$j: #=q
    • 0x10e50:$j: #=q
    • 0x10e6c:$j: #=q
    • 0x10e9c:$j: #=q
    • 0x10eb8:$j: #=q
    SourceRuleDescriptionAuthorStrings
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xff05:$x1: NanoCore Client.exe
    • 0x1018d:$x2: NanoCore.ClientPluginHost
    • 0x117c6:$s1: PluginCommand
    • 0x117ba:$s2: FileCommand
    • 0x1266b:$s3: PipeExists
    • 0x18422:$s4: PipeCreated
    • 0x101b7:$s5: IClientLoggingHost
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xfef5:$x1: NanoCore Client
      • 0xff05:$x1: NanoCore Client
      • 0x1014d:$x2: NanoCore.ClientPlugin
      • 0x1018d:$x3: NanoCore.ClientPluginHost
      • 0x10142:$i1: IClientApp
      • 0x10163:$i2: IClientData
      • 0x1016f:$i3: IClientNetwork
      • 0x1017e:$i4: IClientAppHost
      • 0x101a7:$i5: IClientDataHost
      • 0x101b7:$i6: IClientLoggingHost
      • 0x101ca:$i7: IClientNetworkHost
      • 0x101dd:$i8: IClientUIHost
      • 0x101eb:$i9: IClientNameObjectCollection
      • 0x10207:$i10: IClientReadOnlyNameObjectCollection
      • 0xff54:$s1: ClientPlugin
      • 0x10156:$s1: ClientPlugin
      • 0x1064a:$s2: EndPoint
      • 0x10653:$s3: IPAddress
      • 0x1065d:$s4: IPEndPoint
      • 0x12093:$s6: get_ClientSettings
      • 0x12637:$s7: get_Connected
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x1007b:$c: ProjectData
      • 0x10a82:$d: DESCrypto
      • 0x1844e:$e: KeepAlive
      • 0x1643c:$g: LogClientMessage
      • 0x12637:$i: get_Connected
      • 0x10db8:$j: #=q
      • 0x10de8:$j: #=q
      • 0x10e04:$j: #=q
      • 0x10e34:$j: #=q
      • 0x10e50:$j: #=q
      • 0x10e6c:$j: #=q
      • 0x10e9c:$j: #=q
      • 0x10eb8:$j: #=q
      SourceRuleDescriptionAuthorStrings
      00000009.00000000.291791981.0000000000DB2000.00000002.00000001.01000000.00000005.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xff8d:$x1: NanoCore.ClientPluginHost
      • 0xffca:$x2: IClientNetworkHost
      • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      00000009.00000000.291791981.0000000000DB2000.00000002.00000001.01000000.00000005.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        00000009.00000000.291791981.0000000000DB2000.00000002.00000001.01000000.00000005.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfcf5:$a: NanoCore
        • 0xfd05:$a: NanoCore
        • 0xff39:$a: NanoCore
        • 0xff4d:$a: NanoCore
        • 0xff8d:$a: NanoCore
        • 0xfd54:$b: ClientPlugin
        • 0xff56:$b: ClientPlugin
        • 0xff96:$b: ClientPlugin
        • 0xfe7b:$c: ProjectData
        • 0x10882:$d: DESCrypto
        • 0x1824e:$e: KeepAlive
        • 0x1623c:$g: LogClientMessage
        • 0x12437:$i: get_Connected
        • 0x10bb8:$j: #=q
        • 0x10be8:$j: #=q
        • 0x10c04:$j: #=q
        • 0x10c34:$j: #=q
        • 0x10c50:$j: #=q
        • 0x10c6c:$j: #=q
        • 0x10c9c:$j: #=q
        • 0x10cb8:$j: #=q
        00000003.00000002.298371939.0000000002B01000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          00000003.00000002.298371939.0000000002B01000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
          • 0x23ccb:$a: NanoCore
          • 0x23d24:$a: NanoCore
          • 0x23d61:$a: NanoCore
          • 0x23dda:$a: NanoCore
          • 0x23d2d:$b: ClientPlugin
          • 0x23d6a:$b: ClientPlugin
          • 0x24668:$b: ClientPlugin
          • 0x24675:$b: ClientPlugin
          • 0x1ba3f:$e: KeepAlive
          • 0x241b5:$g: LogClientMessage
          • 0x24135:$i: get_Connected
          • 0x15cfd:$j: #=q
          • 0x15d2d:$j: #=q
          • 0x15d69:$j: #=q
          • 0x15d91:$j: #=q
          • 0x15dc1:$j: #=q
          • 0x15df1:$j: #=q
          • 0x15e21:$j: #=q
          • 0x15e51:$j: #=q
          • 0x15e6d:$j: #=q
          • 0x15e9d:$j: #=q
          Click to see the 51 entries
          SourceRuleDescriptionAuthorStrings
          3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x1018d:$x1: NanoCore.ClientPluginHost
          • 0x101ca:$x2: IClientNetworkHost
          • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0xff05:$x1: NanoCore Client.exe
          • 0x1018d:$x2: NanoCore.ClientPluginHost
          • 0x117c6:$s1: PluginCommand
          • 0x117ba:$s2: FileCommand
          • 0x1266b:$s3: PipeExists
          • 0x18422:$s4: PipeCreated
          • 0x101b7:$s5: IClientLoggingHost
          3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
            3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
            • 0xfef5:$x1: NanoCore Client
            • 0xff05:$x1: NanoCore Client
            • 0x1014d:$x2: NanoCore.ClientPlugin
            • 0x1018d:$x3: NanoCore.ClientPluginHost
            • 0x10142:$i1: IClientApp
            • 0x10163:$i2: IClientData
            • 0x1016f:$i3: IClientNetwork
            • 0x1017e:$i4: IClientAppHost
            • 0x101a7:$i5: IClientDataHost
            • 0x101b7:$i6: IClientLoggingHost
            • 0x101ca:$i7: IClientNetworkHost
            • 0x101dd:$i8: IClientUIHost
            • 0x101eb:$i9: IClientNameObjectCollection
            • 0x10207:$i10: IClientReadOnlyNameObjectCollection
            • 0xff54:$s1: ClientPlugin
            • 0x10156:$s1: ClientPlugin
            • 0x1064a:$s2: EndPoint
            • 0x10653:$s3: IPAddress
            • 0x1065d:$s4: IPEndPoint
            • 0x12093:$s6: get_ClientSettings
            • 0x12637:$s7: get_Connected
            3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
            • 0xfef5:$a: NanoCore
            • 0xff05:$a: NanoCore
            • 0x10139:$a: NanoCore
            • 0x1014d:$a: NanoCore
            • 0x1018d:$a: NanoCore
            • 0xff54:$b: ClientPlugin
            • 0x10156:$b: ClientPlugin
            • 0x10196:$b: ClientPlugin
            • 0x1007b:$c: ProjectData
            • 0x10a82:$d: DESCrypto
            • 0x1844e:$e: KeepAlive
            • 0x1643c:$g: LogClientMessage
            • 0x12637:$i: get_Connected
            • 0x10db8:$j: #=q
            • 0x10de8:$j: #=q
            • 0x10e04:$j: #=q
            • 0x10e34:$j: #=q
            • 0x10e50:$j: #=q
            • 0x10e6c:$j: #=q
            • 0x10e9c:$j: #=q
            • 0x10eb8:$j: #=q
            Click to see the 125 entries

            AV Detection

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, ProcessId: 6408, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            E-Banking Fraud

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, ProcessId: 6408, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Stealing of Sensitive Information

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, ProcessId: 6408, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Remote Access Functionality

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, ProcessId: 6408, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
            Timestamp:192.168.2.391.109.186.54978519912816766 05/12/22-07:58:38.292297
            SID:2816766
            Source Port:49785
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54974419912025019 05/12/22-07:57:00.726091
            SID:2025019
            Source Port:49744
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54976219912816766 05/12/22-07:57:29.709544
            SID:2816766
            Source Port:49762
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54976519912816766 05/12/22-07:57:45.216192
            SID:2816766
            Source Port:49765
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54974419912816718 05/12/22-07:57:02.037427
            SID:2816718
            Source Port:49744
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54975419912025019 05/12/22-07:57:14.238146
            SID:2025019
            Source Port:49754
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54978219912816766 05/12/22-07:58:25.058984
            SID:2816766
            Source Port:49782
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54974519912816766 05/12/22-07:57:09.662455
            SID:2816766
            Source Port:49745
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54977019912816718 05/12/22-07:57:58.710592
            SID:2816718
            Source Port:49770
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54978319912025019 05/12/22-07:58:29.840228
            SID:2025019
            Source Port:49783
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:91.109.186.5192.168.2.31991497702810290 05/12/22-07:57:57.386403
            SID:2810290
            Source Port:1991
            Destination Port:49770
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54978619912816766 05/12/22-07:58:44.794630
            SID:2816766
            Source Port:49786
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54974519912025019 05/12/22-07:57:07.733942
            SID:2025019
            Source Port:49745
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54977319912816766 05/12/22-07:58:03.947984
            SID:2816766
            Source Port:49773
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54975419912816766 05/12/22-07:57:16.743146
            SID:2816766
            Source Port:49754
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54976419912025019 05/12/22-07:57:35.770968
            SID:2025019
            Source Port:49764
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54977019912025019 05/12/22-07:57:57.148651
            SID:2025019
            Source Port:49770
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54974419912816766 05/12/22-07:57:02.725769
            SID:2816766
            Source Port:49744
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54978019912025019 05/12/22-07:58:16.673778
            SID:2025019
            Source Port:49780
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54978319912816766 05/12/22-07:58:31.726985
            SID:2816766
            Source Port:49783
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54977419912025019 05/12/22-07:58:08.550021
            SID:2025019
            Source Port:49774
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54977019912816766 05/12/22-07:57:58.935372
            SID:2816766
            Source Port:49770
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54976219912025019 05/12/22-07:57:27.823235
            SID:2025019
            Source Port:49762
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54978919912025019 05/12/22-07:58:49.123054
            SID:2025019
            Source Port:49789
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54976419912816766 05/12/22-07:57:38.690881
            SID:2816766
            Source Port:49764
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54976519912025019 05/12/22-07:57:43.204061
            SID:2025019
            Source Port:49765
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54978519912025019 05/12/22-07:58:36.405902
            SID:2025019
            Source Port:49785
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54977419912816766 05/12/22-07:58:10.389760
            SID:2816766
            Source Port:49774
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54974319912816766 05/12/22-07:56:52.560880
            SID:2816766
            Source Port:49743
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54978019912816766 05/12/22-07:58:18.415033
            SID:2816766
            Source Port:49780
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54974319912025019 05/12/22-07:56:50.755839
            SID:2025019
            Source Port:49743
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54976619912816766 05/12/22-07:57:51.591169
            SID:2816766
            Source Port:49766
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54978619912025019 05/12/22-07:58:42.971078
            SID:2025019
            Source Port:49786
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54975619912816766 05/12/22-07:57:23.127316
            SID:2816766
            Source Port:49756
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54975619912025019 05/12/22-07:57:21.352785
            SID:2025019
            Source Port:49756
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54976619912025019 05/12/22-07:57:49.806421
            SID:2025019
            Source Port:49766
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.391.109.186.54978219912025019 05/12/22-07:58:23.335512
            SID:2025019
            Source Port:49782
            Destination Port:1991
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000003.00000002.298371939.0000000002B01000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "3577d152-ce3c-4012-b95b-9d207c3b", "Group": "Default", "Domain1": "khalil3131.ddns.net", "Domain2": "127.0.0.1", "Port": 1991, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Enable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeVirustotal: Detection: 85%Perma Link
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeMetadefender: Detection: 85%Perma Link
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeReversingLabs: Detection: 97%
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeAvira: detected
            Source: khalil3131.ddns.netAvira URL Cloud: Label: malware
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen7
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMetadefender: Detection: 85%Perma Link
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 97%
            Source: Yara matchFile source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, type: SAMPLE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.37ceacc.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b530f5.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.37d30f5.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.44aeacc.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b49c96.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.37ceacc.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44ec0d9.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f84629.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.37c9c96.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.44b30f5.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.44aeacc.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.44a9c96.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000000.291791981.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.298371939.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.294404825.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000000.282231195.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.312387842.0000000003461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.314675096.0000000002781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.311896346.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.538786441.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.297856567.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.314132529.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.312592762.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.271804888.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.314708127.0000000003781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.545464811.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.298492088.0000000003B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe PID: 6408, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe PID: 6536, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6776, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6860, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.unpackAvira: Label: TR/NanoCore.fadte
            Source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 9.2.dhcpmon.exe.db0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 11.0.dhcpmon.exe.d0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 11.2.dhcpmon.exe.d0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.unpackAvira: Label: TR/NanoCore.fadte
            Source: 9.0.dhcpmon.exe.db0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: Binary string: System.pdbe source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.542142014.0000000003135000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: indows\System.pdbpdbtem.pdb86 source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.542142014.0000000003135000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: C:\Windows\symbols\dll\System.pdbic source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.542142014.0000000003135000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: C:\Windows\dll\System.pdbve source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.542142014.0000000003135000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdbste source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.542142014.0000000003135000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: C:\Windows\System.pdbTE22#D source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.542142014.0000000003135000.00000004.00000020.00020000.00000000.sdmp

            Networking

            barindex
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49743 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49743 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49744 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49744 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.3:49744 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49745 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49745 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49754 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49754 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49756 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49756 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49762 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49762 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49764 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49764 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49765 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49765 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49766 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49766 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49770 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49770 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 91.109.186.5:1991 -> 192.168.2.3:49770
            Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.3:49770 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49773 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49774 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49774 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49780 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49780 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49782 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49782 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49783 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49783 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49785 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49785 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49786 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49786 -> 91.109.186.5:1991
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49789 -> 91.109.186.5:1991
            Source: Malware configuration extractorURLs: khalil3131.ddns.net
            Source: Malware configuration extractorURLs: 127.0.0.1
            Source: unknownDNS query: name: khalil3131.ddns.net
            Source: Joe Sandbox ViewASN Name: IELOIELOMainNetworkFR IELOIELOMainNetworkFR
            Source: global trafficTCP traffic: 192.168.2.3:49743 -> 91.109.186.5:1991
            Source: unknownDNS traffic detected: queries for: khalil3131.ddns.net
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_0559327A WSARecv,
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.541156290.00000000014EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, type: SAMPLE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.37ceacc.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b530f5.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.37d30f5.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.44aeacc.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b49c96.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.37ceacc.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44ec0d9.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f84629.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.37c9c96.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.44b30f5.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.44aeacc.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.44a9c96.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000000.291791981.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.298371939.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.294404825.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000000.282231195.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.312387842.0000000003461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.314675096.0000000002781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.311896346.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.538786441.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.297856567.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.314132529.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.312592762.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.271804888.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.314708127.0000000003781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.545464811.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.298492088.0000000003B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe PID: 6408, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe PID: 6536, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6776, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6860, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED

            System Summary

            barindex
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, type: SAMPLEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, type: SAMPLEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, type: SAMPLEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 11.2.dhcpmon.exe.37ceacc.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 11.2.dhcpmon.exe.37ceacc.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 9.2.dhcpmon.exe.3483dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 9.2.dhcpmon.exe.3483dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 11.2.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 11.2.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 11.2.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b530f5.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b530f5.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 11.2.dhcpmon.exe.37d30f5.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 11.2.dhcpmon.exe.37d30f5.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 9.2.dhcpmon.exe.44aeacc.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 9.2.dhcpmon.exe.44aeacc.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b49c96.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b49c96.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b49c96.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 11.2.dhcpmon.exe.37ceacc.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 11.2.dhcpmon.exe.37ceacc.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.349140c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.349140c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 11.0.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 11.0.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 11.0.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 9.2.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 9.2.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 9.2.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.2b23eec.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.2b23eec.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 11.2.dhcpmon.exe.27a3dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 11.2.dhcpmon.exe.27a3dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44ec0d9.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44ec0d9.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f84629.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f84629.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 11.2.dhcpmon.exe.37c9c96.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 11.2.dhcpmon.exe.37c9c96.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 11.2.dhcpmon.exe.37c9c96.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 9.2.dhcpmon.exe.44b30f5.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 9.2.dhcpmon.exe.44b30f5.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 9.2.dhcpmon.exe.44aeacc.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 9.2.dhcpmon.exe.44aeacc.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 9.2.dhcpmon.exe.44a9c96.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 9.2.dhcpmon.exe.44a9c96.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 9.2.dhcpmon.exe.44a9c96.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5860000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5860000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 9.0.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 9.0.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 9.0.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000009.00000000.291791981.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000009.00000000.291791981.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000003.00000002.298371939.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000B.00000000.294404825.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000B.00000000.294404825.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000003.00000000.282231195.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000003.00000000.282231195.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000009.00000002.312387842.0000000003461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000002.545700012.0000000005860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000000.00000002.545700012.0000000005860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
            Source: 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0000000B.00000002.314675096.0000000002781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000009.00000002.311896346.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000009.00000002.311896346.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000002.538786441.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000000.00000002.538786441.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000003.00000002.297856567.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000003.00000002.297856567.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000B.00000002.314132529.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000B.00000002.314132529.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000009.00000002.312592762.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000000.271804888.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000000.00000000.271804888.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000B.00000002.314708127.0000000003781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000003.00000002.298492088.0000000003B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe PID: 6408, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe PID: 6408, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe PID: 6536, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe PID: 6536, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: dhcpmon.exe PID: 6776, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: dhcpmon.exe PID: 6776, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: dhcpmon.exe PID: 6860, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: dhcpmon.exe PID: 6860, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Detects NanoCore Author: ditekSHen
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, type: SAMPLEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, type: SAMPLEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, type: SAMPLEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, type: SAMPLEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 11.2.dhcpmon.exe.37ceacc.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 11.2.dhcpmon.exe.37ceacc.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 11.2.dhcpmon.exe.37ceacc.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 9.2.dhcpmon.exe.3483dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 9.2.dhcpmon.exe.3483dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 9.2.dhcpmon.exe.3483dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 11.2.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 11.2.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 11.2.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 11.2.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b530f5.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b530f5.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b530f5.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 11.2.dhcpmon.exe.37d30f5.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 11.2.dhcpmon.exe.37d30f5.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 11.2.dhcpmon.exe.37d30f5.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 9.2.dhcpmon.exe.44aeacc.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 9.2.dhcpmon.exe.44aeacc.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 9.2.dhcpmon.exe.44aeacc.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b49c96.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b49c96.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b49c96.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b49c96.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 11.2.dhcpmon.exe.37ceacc.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 11.2.dhcpmon.exe.37ceacc.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 11.2.dhcpmon.exe.37ceacc.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.349140c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.349140c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.349140c.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 11.0.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 11.0.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 11.0.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 11.0.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 9.2.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 9.2.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 9.2.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 9.2.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.2b23eec.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.2b23eec.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.2b23eec.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 11.2.dhcpmon.exe.27a3dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 11.2.dhcpmon.exe.27a3dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 11.2.dhcpmon.exe.27a3dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44ec0d9.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44ec0d9.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44ec0d9.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f84629.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f84629.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f84629.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 11.2.dhcpmon.exe.37c9c96.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 11.2.dhcpmon.exe.37c9c96.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 11.2.dhcpmon.exe.37c9c96.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 11.2.dhcpmon.exe.37c9c96.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 9.2.dhcpmon.exe.44b30f5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 9.2.dhcpmon.exe.44b30f5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 9.2.dhcpmon.exe.44b30f5.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 9.2.dhcpmon.exe.44aeacc.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 9.2.dhcpmon.exe.44aeacc.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 9.2.dhcpmon.exe.44aeacc.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 9.2.dhcpmon.exe.44a9c96.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 9.2.dhcpmon.exe.44a9c96.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 9.2.dhcpmon.exe.44a9c96.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 9.2.dhcpmon.exe.44a9c96.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5860000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5860000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5860000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 9.0.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 9.0.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 9.0.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 9.0.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000009.00000000.291791981.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000009.00000000.291791981.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000003.00000002.298371939.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000B.00000000.294404825.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0000000B.00000000.294404825.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000003.00000000.282231195.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000003.00000000.282231195.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000009.00000002.312387842.0000000003461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000000.00000002.545700012.0000000005860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000000.00000002.545700012.0000000005860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 00000000.00000002.545700012.0000000005860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0000000B.00000002.314675096.0000000002781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000009.00000002.311896346.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000009.00000002.311896346.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000000.00000002.538786441.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000000.00000002.538786441.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000003.00000002.297856567.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000003.00000002.297856567.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000B.00000002.314132529.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0000000B.00000002.314132529.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000009.00000002.312592762.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000000.00000000.271804888.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000000.00000000.271804888.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000B.00000002.314708127.0000000003781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000003.00000002.298492088.0000000003B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe PID: 6408, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe PID: 6408, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe PID: 6536, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe PID: 6536, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: dhcpmon.exe PID: 6776, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: dhcpmon.exe PID: 6776, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: dhcpmon.exe PID: 6860, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: dhcpmon.exe PID: 6860, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_00CA524A
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_014D89D0
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_014D3850
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_014D2FA8
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_014D23A0
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_014DB2A0
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_014D95D0
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_014D306F
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_014D9697
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 3_2_0043524A
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 3_2_04C023A0
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 3_2_04C02FA8
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 3_2_04C0306F
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_00DB524A
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_05583850
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_05582FA8
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_055823A0
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_0558306F
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_000D524A
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_048D2FA8
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_048D23A0
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_048D3850
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_048D306F
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_05591BB2 NtQuerySystemInformation,
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_05591B77 NtQuerySystemInformation,
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.545700012.0000000005860000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.541156290.00000000014EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.542169344.0000000003481000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.545711499.0000000005870000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.545464811.00000000044DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.545464811.00000000044DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000003.00000002.298371939.0000000002B01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000003.00000002.298371939.0000000002B01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000003.00000002.298492088.0000000003B01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000003.00000002.298492088.0000000003B01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000003.00000002.298492088.0000000003B01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeStatic PE information: Section: .rsrc ZLIB complexity 1.00031072443
            Source: dhcpmon.exe.0.drStatic PE information: Section: .rsrc ZLIB complexity 1.00031072443
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeVirustotal: Detection: 85%
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeMetadefender: Detection: 85%
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeReversingLabs: Detection: 97%
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeFile read: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeJump to behavior
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe "C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe"
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp187C.tmp
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe 0
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp21A4.tmp
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
            Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp187C.tmp
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp21A4.tmp
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_05591972 AdjustTokenPrivileges,
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_0559193B AdjustTokenPrivileges,
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeFile created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9AJump to behavior
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeFile created: C:\Users\user\AppData\Local\Temp\tmp187C.tmpJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winEXE@10/9@18/1
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 11.2.dhcpmon.exe.d0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 11.2.dhcpmon.exe.d0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 9.0.dhcpmon.exe.db0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 9.0.dhcpmon.exe.db0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 11.0.dhcpmon.exe.d0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 11.0.dhcpmon.exe.d0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 9.2.dhcpmon.exe.db0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 9.2.dhcpmon.exe.db0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{3577d152-ce3c-4012-b95b-9d207c3b03b4}
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6624:120:WilError_01
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6488:120:WilError_01
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
            Source: dhcpmon.exe.0.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
            Source: dhcpmon.exe.0.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
            Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: Binary string: System.pdbe source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.542142014.0000000003135000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: indows\System.pdbpdbtem.pdb86 source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.542142014.0000000003135000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: C:\Windows\symbols\dll\System.pdbic source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.542142014.0000000003135000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: C:\Windows\dll\System.pdbve source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.542142014.0000000003135000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdbste source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.542142014.0000000003135000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: C:\Windows\System.pdbTE22#D source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.542142014.0000000003135000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: dhcpmon.exe.0.dr, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 9.2.dhcpmon.exe.db0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 9.2.dhcpmon.exe.db0000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 9.0.dhcpmon.exe.db0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 9.0.dhcpmon.exe.db0000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 11.0.dhcpmon.exe.d0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 11.0.dhcpmon.exe.d0000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 11.2.dhcpmon.exe.d0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 11.2.dhcpmon.exe.d0000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: dhcpmon.exe.0.dr, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: dhcpmon.exe.0.dr, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 9.2.dhcpmon.exe.db0000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 9.2.dhcpmon.exe.db0000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 9.0.dhcpmon.exe.db0000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 9.0.dhcpmon.exe.db0000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 11.0.dhcpmon.exe.d0000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 11.0.dhcpmon.exe.d0000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 11.2.dhcpmon.exe.d0000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 11.2.dhcpmon.exe.d0000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp187C.tmp

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeFile opened: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe:Zone.Identifier read attributes | delete
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe TID: 6672Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe TID: 6668Thread sleep time: -800000s >= -30000s
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe TID: 6564Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6844Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6944Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeWindow / User API: foregroundWindowGot 1086
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_0559169A GetSystemInfo,
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.541731157.0000000001566000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll'
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeMemory allocated: page read and write | page guard
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp187C.tmp
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp21A4.tmp
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000003.317924034.00000000015B4000.00000004.00000020.00020000.00000000.sdmp, 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000003.354596817.00000000015B4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, type: SAMPLE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.37ceacc.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b530f5.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.37d30f5.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.44aeacc.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b49c96.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.37ceacc.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44ec0d9.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f84629.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.37c9c96.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.44b30f5.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.44aeacc.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.44a9c96.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000000.291791981.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.298371939.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.294404825.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000000.282231195.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.312387842.0000000003461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.314675096.0000000002781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.311896346.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.538786441.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.297856567.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.314132529.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.312592762.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.271804888.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.314708127.0000000003781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.545464811.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.298492088.0000000003B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe PID: 6408, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe PID: 6536, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6776, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6860, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED

            Remote Access Functionality

            barindex
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeString found in binary or memory: NanoCore.ClientPluginHost
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.545700012.0000000005860000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.545700012.0000000005860000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.542169344.0000000003481000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.542169344.0000000003481000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.538786441.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000000.00000002.545464811.00000000044DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeString found in binary or memory: NanoCore.ClientPluginHost
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000003.00000002.298371939.0000000002B01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000003.00000002.298371939.0000000002B01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000003.00000000.282231195.0000000000432000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000003.00000002.298492088.0000000003B01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, 00000003.00000002.298492088.0000000003B01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: dhcpmon.exeString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 00000009.00000000.291791981.0000000000DB2000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 00000009.00000002.312387842.0000000003461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 00000009.00000002.312387842.0000000003461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: dhcpmon.exe, 00000009.00000002.312592762.0000000004461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 00000009.00000002.312592762.0000000004461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: dhcpmon.exeString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 0000000B.00000000.294404825.00000000000D2000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 0000000B.00000002.314675096.0000000002781000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 0000000B.00000002.314675096.0000000002781000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: dhcpmon.exe, 0000000B.00000002.314708127.0000000003781000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 0000000B.00000002.314708127.0000000003781000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe.0.drString found in binary or memory: NanoCore.ClientPluginHost
            Source: Yara matchFile source: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe, type: SAMPLE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.37ceacc.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b530f5.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.37d30f5.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.44aeacc.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b49c96.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.37ceacc.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.dhcpmon.exe.d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44ec0d9.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f84629.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.dhcpmon.exe.37c9c96.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.44b30f5.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.44aeacc.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.dhcpmon.exe.44a9c96.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.3b4eacc.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.dhcpmon.exe.db0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000000.291791981.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.298371939.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.294404825.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000000.282231195.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.312387842.0000000003461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.314675096.0000000002781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.311896346.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.538786441.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.297856567.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.314132529.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.312592762.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.271804888.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.314708127.0000000003781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.545464811.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.298492088.0000000003B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe PID: 6408, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe PID: 6536, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6776, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6860, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_05592DBE bind,
            Source: C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeCode function: 0_2_05592D6C bind,
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            1
            Access Token Manipulation
            2
            Masquerading
            21
            Input Capture
            11
            Security Software Discovery
            Remote Services21
            Input Capture
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts12
            Process Injection
            1
            Disable or Modify Tools
            LSASS Memory2
            Process Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            Exfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)1
            Scheduled Task/Job
            21
            Virtualization/Sandbox Evasion
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
            Remote Access Software
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
            Access Token Manipulation
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer1
            Ingress Tool Transfer
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script12
            Process Injection
            LSA Secrets3
            System Information Discovery
            SSHKeyloggingData Transfer Size Limits1
            Non-Application Layer Protocol
            Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common1
            Deobfuscate/Decode Files or Information
            Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 Channel21
            Application Layer Protocol
            Jamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items1
            Hidden Files and Directories
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
            Software Packing
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 624876 Sample: 8FA3B2EB7650AC7FF7DBBEED506... Startdate: 12/05/2022 Architecture: WINDOWS Score: 100 39 khalil3131.ddns.net 2->39 43 Snort IDS alert for network traffic 2->43 45 Found malware configuration 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 13 other signatures 2->49 8 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe 1 15 2->8         started        13 dhcpmon.exe 3 2->13         started        15 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe 3 2->15         started        17 dhcpmon.exe 2 2->17         started        signatures3 process4 dnsIp5 41 khalil3131.ddns.net 91.109.186.5, 1991, 49743, 49744 IELOIELOMainNetworkFR France 8->41 27 C:\Program Files (x86)\...\dhcpmon.exe, PE32 8->27 dropped 29 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 8->29 dropped 31 C:\Users\user\AppData\Local\...\tmp187C.tmp, XML 8->31 dropped 33 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 8->33 dropped 51 Uses schtasks.exe or at.exe to add and modify task schedules 8->51 53 Hides that the sample has been downloaded from the Internet (zone.identifier) 8->53 19 schtasks.exe 1 8->19         started        21 schtasks.exe 1 8->21         started        35 C:\Users\user\AppData\...\dhcpmon.exe.log, ASCII 13->35 dropped 37 8FA3B2EB7650AC7FF7...05D64D69327.exe.log, ASCII 15->37 dropped file6 signatures7 process8 process9 23 conhost.exe 19->23         started        25 conhost.exe 21->25         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe86%VirustotalBrowse
            8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe86%MetadefenderBrowse
            8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe98%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
            8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe100%AviraTR/Dropper.MSIL.Gen7
            8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%AviraTR/Dropper.MSIL.Gen7
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe86%MetadefenderBrowse
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe98%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
            SourceDetectionScannerLabelLinkDownload
            0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.44e7ab0.3.unpack100%AviraTR/NanoCore.fadteDownload File
            3.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            9.2.dhcpmon.exe.db0000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            11.0.dhcpmon.exe.d0000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            3.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.430000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            11.2.dhcpmon.exe.d0000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            0.0.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.ca0000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            0.2.8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.5f80000.6.unpack100%AviraTR/NanoCore.fadteDownload File
            9.0.dhcpmon.exe.db0000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            No Antivirus matches
            SourceDetectionScannerLabelLink
            khalil3131.ddns.net100%Avira URL Cloudmalware
            127.0.0.10%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            khalil3131.ddns.net
            91.109.186.5
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              khalil3131.ddns.nettrue
              • Avira URL Cloud: malware
              unknown
              127.0.0.1true
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              91.109.186.5
              khalil3131.ddns.netFrance
              29075IELOIELOMainNetworkFRtrue
              Joe Sandbox Version:34.0.0 Boulder Opal
              Analysis ID:624876
              Start date and time: 12/05/202207:55:262022-05-12 07:55:26 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 12m 43s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:32
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@10/9@18/1
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Adjust boot time
              • Enable AMSI
              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
              • TCP Packets have been reduced to 100
              • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, MusNotifyIcon.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 52.152.110.14, 40.125.122.176, 52.242.101.226, 20.223.24.244
              • Excluded domains from analysis (whitelisted): fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, go.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
              • Not all processes where analyzed, report is missing behavior information
              • Report creation exceeded maximum time and may have missing disassembly code information.
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              TimeTypeDescription
              07:56:43AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              07:56:46Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe" s>$(Arg0)
              07:56:49API Interceptor889x Sleep call for process: 8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe modified
              07:56:50Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
              No context
              No context
              No context
              No context
              No context
              Process:C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):207872
              Entropy (8bit):7.449716258096661
              Encrypted:false
              SSDEEP:3072:szEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIXJPAGTwjgaxODOeSQcY/UShKT:sLV6Bta6dtJmakIM5Ir8PxtPY/1KT
              MD5:DF1DC1A245D93014003E9ECC4F654602
              SHA1:B2F5DA6A917D9535A623DE61C603D03F0D225FB4
              SHA-256:8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D6932715F8885508FB6F988C6
              SHA-512:05E6AF5EA0218F3FA03782437373B68A00E95CD9BC9D90FB36E1575D09C964019B7D54CD57246A0B843E2666AC1338197227B613B6FDCF1963F2A364B508A2C7
              Malicious:true
              Yara Hits:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Joe Security
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: ditekSHen
              • Rule: NanoCore, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Metadefender, Detection: 86%, Browse
              • Antivirus: ReversingLabs, Detection: 98%
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................b........... ........@.. ......................................................................8...W.... ..._........................................................................... ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc...._... ...`..................@..@................t.......H...........T............................................................0..Q........o5.......*.o6....-.&......3+..+.... ....3......1..... 2.... ....3.... .......*.*....0..E.......s7....-(&s8....-&&s9....,$&s:........s;........*.....+.....+.....+.....0..........~....o<...*..0..........~....o=...*..0..........~....o>...*..0..........~....o?...*..0..........~....o@...*..0.............-.&(A...*&+...0..$.......~B........-.(...+.-.&+..B...+.~B...*.0.............-.&(A...*&+...0..
              Process:C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview:[ZoneTransfer]....ZoneId=0
              Process:C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):525
              Entropy (8bit):5.2874233355119316
              Encrypted:false
              SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
              MD5:61CCF53571C9ABA6511D696CB0D32E45
              SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
              SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
              SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
              Malicious:true
              Reputation:high, very likely benign file
              Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):525
              Entropy (8bit):5.2874233355119316
              Encrypted:false
              SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
              MD5:61CCF53571C9ABA6511D696CB0D32E45
              SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
              SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
              SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
              Malicious:true
              Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
              Process:C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1335
              Entropy (8bit):5.213341096764609
              Encrypted:false
              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0EIy3xtn:cbk4oL600QydbQxIYODOLedq3J3j
              MD5:0A1F07A06540020B73F62710794160BD
              SHA1:9063FD28DD342A6640746A3D797F1D9FE63B291D
              SHA-256:0C48FB31BC2830791F55EED4BDFE7D63D6A25F13992F45B501E0572DD386C875
              SHA-512:7ECDA872E34779ED83D808AB998D803DEC209E8C87D04A858960ECDFD5650B49D213CC1C1A11615AAFF2CBA54AFEE005CE9AADE5DA486CC6BC751433634B103B
              Malicious:true
              Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
              Process:C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1310
              Entropy (8bit):5.109425792877704
              Encrypted:false
              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
              MD5:5C2F41CFC6F988C859DA7D727AC2B62A
              SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
              SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
              SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
              Malicious:false
              Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
              Process:C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
              File Type:data
              Category:modified
              Size (bytes):232
              Entropy (8bit):7.089541637477408
              Encrypted:false
              SSDEEP:3:XrURGizD7cnRNGbgCFKRNX/pBK0jCV83ne+VdWPiKgmR7kkmefoeLBizbCuVkqYM:X4LDAnybgCFcps0OafmCYDlizZr/i/Oh
              MD5:9E7D0351E4DF94A9B0BADCEB6A9DB963
              SHA1:76C6A69B1C31CEA2014D1FD1E222A3DD1E433005
              SHA-256:AAFC7B40C5FE680A2BB549C3B90AABAAC63163F74FFFC0B00277C6BBFF88B757
              SHA-512:93CCF7E046A3C403ECF8BC4F1A8850BA0180FE18926C98B297C5214EB77BC212C8FBCC58412D0307840CF2715B63BE68BACDA95AA98E82835C5C53F17EF38511
              Malicious:false
              Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&
              Process:C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
              File Type:Non-ISO extended-ASCII text, with no line terminators
              Category:dropped
              Size (bytes):8
              Entropy (8bit):3.0
              Encrypted:false
              SSDEEP:3:9Sl:9s
              MD5:1DE95590512455690E9C4A8ECD7205E4
              SHA1:C328665D12D5A6291B465792573BD8E3BEF209AD
              SHA-256:6F905D8CEA028A5E82059798F92A7CDAD70D47ACE17D101FC9487DCE33466D4D
              SHA-512:59D9372193DE6B0DBA93596D43492E5652CC6AFA1488F0BF0CAA2A1DBE994BC0DB606BD68B7894D828D20D0F8F62957BA3C86731A79767465FA303F23142FBF8
              Malicious:true
              Preview:....'4.H
              Process:C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):72
              Entropy (8bit):4.727585120442808
              Encrypted:false
              SSDEEP:3:oNWXp5vdjkTWSnnggh216d4N:oNWXpF3Unggh54
              MD5:591AEF748C8D2CA5AEC3419BDE1BD8FF
              SHA1:660EC4B1ECCF185F68113A52CA4CF7AC79B614B4
              SHA-256:FE23408EB733D1F845D83D6D2972934FEEF1C0097C7FAB221AD4F41E21523293
              SHA-512:96061B47BEC49B1575FDF414F332D0CBDD6CB3B089E56F1968B03F69839D25CA22CE4EFC96CC7AB42D9B4CCF7F13ACC7ECA38F828D92C7CF806A598684B886FB
              Malicious:false
              Preview:C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):7.449716258096661
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              • Win32 Executable (generic) a (10002005/4) 49.78%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              File name:8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
              File size:207872
              MD5:df1dc1a245d93014003e9ecc4f654602
              SHA1:b2f5da6a917d9535a623de61c603d03f0d225fb4
              SHA256:8fa3b2eb7650ac7ff7dbbeed506e3f17b805d64d6932715f8885508fb6f988c6
              SHA512:05e6af5ea0218f3fa03782437373b68a00e95cd9bc9d90fb36e1575d09c964019b7d54cd57246a0b843e2666ac1338197227b613b6fdcf1963f2a364b508a2c7
              SSDEEP:3072:szEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIXJPAGTwjgaxODOeSQcY/UShKT:sLV6Bta6dtJmakIM5Ir8PxtPY/1KT
              TLSH:4C14CF563BE98A3ED2DF85B8611202578378C2E7D9D3F3DA18D851B78B627E40A070D7
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................b........... ........@.. .....................................................................
              Icon Hash:00828e8e8686b000
              Entrypoint:0x41e792
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
              DLL Characteristics:
              Time Stamp:0x54E927A1 [Sun Feb 22 00:49:37 2015 UTC]
              TLS Callbacks:
              CLR (.Net) Version:v2.0.50727
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1e7380x57.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x15fc8.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x200000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000x1c7980x1c800False0.594503837719data6.59804476018IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .reloc0x200000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              .rsrc0x220000x15fc80x16000False1.00031072443data7.99780343549IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_RCDATA0x220580x15f70TIM image, Pixel at (10392,19457) Size=2043x65115
              DLLImport
              mscoree.dll_CorExeMain
              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              192.168.2.391.109.186.54978519912816766 05/12/22-07:58:38.292297TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497851991192.168.2.391.109.186.5
              192.168.2.391.109.186.54974419912025019 05/12/22-07:57:00.726091TCP2025019ET TROJAN Possible NanoCore C2 60B497441991192.168.2.391.109.186.5
              192.168.2.391.109.186.54976219912816766 05/12/22-07:57:29.709544TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497621991192.168.2.391.109.186.5
              192.168.2.391.109.186.54976519912816766 05/12/22-07:57:45.216192TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497651991192.168.2.391.109.186.5
              192.168.2.391.109.186.54974419912816718 05/12/22-07:57:02.037427TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497441991192.168.2.391.109.186.5
              192.168.2.391.109.186.54975419912025019 05/12/22-07:57:14.238146TCP2025019ET TROJAN Possible NanoCore C2 60B497541991192.168.2.391.109.186.5
              192.168.2.391.109.186.54978219912816766 05/12/22-07:58:25.058984TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497821991192.168.2.391.109.186.5
              192.168.2.391.109.186.54974519912816766 05/12/22-07:57:09.662455TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497451991192.168.2.391.109.186.5
              192.168.2.391.109.186.54977019912816718 05/12/22-07:57:58.710592TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497701991192.168.2.391.109.186.5
              192.168.2.391.109.186.54978319912025019 05/12/22-07:58:29.840228TCP2025019ET TROJAN Possible NanoCore C2 60B497831991192.168.2.391.109.186.5
              91.109.186.5192.168.2.31991497702810290 05/12/22-07:57:57.386403TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 119914977091.109.186.5192.168.2.3
              192.168.2.391.109.186.54978619912816766 05/12/22-07:58:44.794630TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497861991192.168.2.391.109.186.5
              192.168.2.391.109.186.54974519912025019 05/12/22-07:57:07.733942TCP2025019ET TROJAN Possible NanoCore C2 60B497451991192.168.2.391.109.186.5
              192.168.2.391.109.186.54977319912816766 05/12/22-07:58:03.947984TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497731991192.168.2.391.109.186.5
              192.168.2.391.109.186.54975419912816766 05/12/22-07:57:16.743146TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497541991192.168.2.391.109.186.5
              192.168.2.391.109.186.54976419912025019 05/12/22-07:57:35.770968TCP2025019ET TROJAN Possible NanoCore C2 60B497641991192.168.2.391.109.186.5
              192.168.2.391.109.186.54977019912025019 05/12/22-07:57:57.148651TCP2025019ET TROJAN Possible NanoCore C2 60B497701991192.168.2.391.109.186.5
              192.168.2.391.109.186.54974419912816766 05/12/22-07:57:02.725769TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497441991192.168.2.391.109.186.5
              192.168.2.391.109.186.54978019912025019 05/12/22-07:58:16.673778TCP2025019ET TROJAN Possible NanoCore C2 60B497801991192.168.2.391.109.186.5
              192.168.2.391.109.186.54978319912816766 05/12/22-07:58:31.726985TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497831991192.168.2.391.109.186.5
              192.168.2.391.109.186.54977419912025019 05/12/22-07:58:08.550021TCP2025019ET TROJAN Possible NanoCore C2 60B497741991192.168.2.391.109.186.5
              192.168.2.391.109.186.54977019912816766 05/12/22-07:57:58.935372TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497701991192.168.2.391.109.186.5
              192.168.2.391.109.186.54976219912025019 05/12/22-07:57:27.823235TCP2025019ET TROJAN Possible NanoCore C2 60B497621991192.168.2.391.109.186.5
              192.168.2.391.109.186.54978919912025019 05/12/22-07:58:49.123054TCP2025019ET TROJAN Possible NanoCore C2 60B497891991192.168.2.391.109.186.5
              192.168.2.391.109.186.54976419912816766 05/12/22-07:57:38.690881TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497641991192.168.2.391.109.186.5
              192.168.2.391.109.186.54976519912025019 05/12/22-07:57:43.204061TCP2025019ET TROJAN Possible NanoCore C2 60B497651991192.168.2.391.109.186.5
              192.168.2.391.109.186.54978519912025019 05/12/22-07:58:36.405902TCP2025019ET TROJAN Possible NanoCore C2 60B497851991192.168.2.391.109.186.5
              192.168.2.391.109.186.54977419912816766 05/12/22-07:58:10.389760TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497741991192.168.2.391.109.186.5
              192.168.2.391.109.186.54974319912816766 05/12/22-07:56:52.560880TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497431991192.168.2.391.109.186.5
              192.168.2.391.109.186.54978019912816766 05/12/22-07:58:18.415033TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497801991192.168.2.391.109.186.5
              192.168.2.391.109.186.54974319912025019 05/12/22-07:56:50.755839TCP2025019ET TROJAN Possible NanoCore C2 60B497431991192.168.2.391.109.186.5
              192.168.2.391.109.186.54976619912816766 05/12/22-07:57:51.591169TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497661991192.168.2.391.109.186.5
              192.168.2.391.109.186.54978619912025019 05/12/22-07:58:42.971078TCP2025019ET TROJAN Possible NanoCore C2 60B497861991192.168.2.391.109.186.5
              192.168.2.391.109.186.54975619912816766 05/12/22-07:57:23.127316TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497561991192.168.2.391.109.186.5
              192.168.2.391.109.186.54975619912025019 05/12/22-07:57:21.352785TCP2025019ET TROJAN Possible NanoCore C2 60B497561991192.168.2.391.109.186.5
              192.168.2.391.109.186.54976619912025019 05/12/22-07:57:49.806421TCP2025019ET TROJAN Possible NanoCore C2 60B497661991192.168.2.391.109.186.5
              192.168.2.391.109.186.54978219912025019 05/12/22-07:58:23.335512TCP2025019ET TROJAN Possible NanoCore C2 60B497821991192.168.2.391.109.186.5
              TimestampSource PortDest PortSource IPDest IP
              May 12, 2022 07:56:50.539573908 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:50.668284893 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:50.668468952 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:50.755839109 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:51.017306089 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:51.017383099 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:51.303261995 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:51.303349972 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:51.509748936 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:51.586275101 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:51.586765051 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:51.637226105 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:51.644325972 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:51.757510900 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:51.918226957 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:51.920588970 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.247191906 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.247437954 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.292334080 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.292467117 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.307349920 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.307497978 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.321219921 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.321297884 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.336314917 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.336502075 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.350361109 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.350434065 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.365328074 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.365421057 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.379390955 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.379463911 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.394315004 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.394382000 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.408458948 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.408603907 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.423321009 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.423480988 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.560709953 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.560879946 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.574340105 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.574445009 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.589399099 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.589541912 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.603425026 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.603625059 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.618385077 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.618510008 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.632329941 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.632508039 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.639597893 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.647301912 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.647418022 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.661343098 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.661408901 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.676328897 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.676493883 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.690356970 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.690505028 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.705364943 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.705516100 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.719393015 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.719518900 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.734338045 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.734464884 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.748327971 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.748451948 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.763458967 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.763600111 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.777298927 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.777380943 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.794317007 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.794421911 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.808258057 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.808419943 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.823251963 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.823363066 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.837270021 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.837399006 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.855340958 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.855494022 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.870321989 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.870464087 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.884305000 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.884403944 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.899338007 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.899445057 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.913316965 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.913398027 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.928405046 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.928531885 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.942298889 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.942693949 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.957298994 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.957470894 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.971311092 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.971438885 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:52.986308098 CEST19914974391.109.186.5192.168.2.3
              May 12, 2022 07:56:52.986397028 CEST497431991192.168.2.391.109.186.5
              May 12, 2022 07:56:53.000297070 CEST19914974391.109.186.5192.168.2.3
              TimestampSource PortDest PortSource IPDest IP
              May 12, 2022 07:56:50.503297091 CEST6485153192.168.2.38.8.8.8
              May 12, 2022 07:56:50.524601936 CEST53648518.8.8.8192.168.2.3
              May 12, 2022 07:57:00.567784071 CEST4931653192.168.2.38.8.8.8
              May 12, 2022 07:57:00.590230942 CEST53493168.8.8.8192.168.2.3
              May 12, 2022 07:57:07.568006992 CEST5641753192.168.2.38.8.8.8
              May 12, 2022 07:57:07.587565899 CEST53564178.8.8.8192.168.2.3
              May 12, 2022 07:57:14.085995913 CEST5742153192.168.2.38.8.8.8
              May 12, 2022 07:57:14.105559111 CEST53574218.8.8.8192.168.2.3
              May 12, 2022 07:57:21.200678110 CEST4987353192.168.2.38.8.8.8
              May 12, 2022 07:57:21.221888065 CEST53498738.8.8.8192.168.2.3
              May 12, 2022 07:57:27.661298990 CEST4932753192.168.2.38.8.8.8
              May 12, 2022 07:57:27.682848930 CEST53493278.8.8.8192.168.2.3
              May 12, 2022 07:57:35.116136074 CEST5898153192.168.2.38.8.8.8
              May 12, 2022 07:57:35.138746023 CEST53589818.8.8.8192.168.2.3
              May 12, 2022 07:57:43.055500031 CEST6445253192.168.2.38.8.8.8
              May 12, 2022 07:57:43.074953079 CEST53644528.8.8.8192.168.2.3
              May 12, 2022 07:57:49.621150017 CEST6138053192.168.2.38.8.8.8
              May 12, 2022 07:57:49.643440962 CEST53613808.8.8.8192.168.2.3
              May 12, 2022 07:57:57.000972986 CEST5281053192.168.2.38.8.8.8
              May 12, 2022 07:57:57.018244982 CEST53528108.8.8.8192.168.2.3
              May 12, 2022 07:58:03.777712107 CEST5515153192.168.2.38.8.8.8
              May 12, 2022 07:58:03.795254946 CEST53551518.8.8.8192.168.2.3
              May 12, 2022 07:58:08.391948938 CEST5979553192.168.2.38.8.8.8
              May 12, 2022 07:58:08.415642977 CEST53597958.8.8.8192.168.2.3
              May 12, 2022 07:58:16.497291088 CEST6481653192.168.2.38.8.8.8
              May 12, 2022 07:58:16.518326998 CEST53648168.8.8.8192.168.2.3
              May 12, 2022 07:58:22.992727995 CEST6499653192.168.2.38.8.8.8
              May 12, 2022 07:58:23.013859987 CEST53649968.8.8.8192.168.2.3
              May 12, 2022 07:58:29.546488047 CEST5381653192.168.2.38.8.8.8
              May 12, 2022 07:58:29.566279888 CEST53538168.8.8.8192.168.2.3
              May 12, 2022 07:58:36.256527901 CEST5209653192.168.2.38.8.8.8
              May 12, 2022 07:58:36.275990009 CEST53520968.8.8.8192.168.2.3
              May 12, 2022 07:58:42.822968960 CEST6064053192.168.2.38.8.8.8
              May 12, 2022 07:58:42.840430975 CEST53606408.8.8.8192.168.2.3
              May 12, 2022 07:58:48.970896959 CEST6386153192.168.2.38.8.8.8
              May 12, 2022 07:58:48.990263939 CEST53638618.8.8.8192.168.2.3
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              May 12, 2022 07:56:50.503297091 CEST192.168.2.38.8.8.80xec6dStandard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:57:00.567784071 CEST192.168.2.38.8.8.80x4057Standard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:57:07.568006992 CEST192.168.2.38.8.8.80x54a4Standard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:57:14.085995913 CEST192.168.2.38.8.8.80x4379Standard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:57:21.200678110 CEST192.168.2.38.8.8.80xfab9Standard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:57:27.661298990 CEST192.168.2.38.8.8.80x9dc1Standard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:57:35.116136074 CEST192.168.2.38.8.8.80x64e8Standard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:57:43.055500031 CEST192.168.2.38.8.8.80x2ccaStandard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:57:49.621150017 CEST192.168.2.38.8.8.80x1545Standard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:57:57.000972986 CEST192.168.2.38.8.8.80x7a8dStandard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:58:03.777712107 CEST192.168.2.38.8.8.80x9baStandard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:58:08.391948938 CEST192.168.2.38.8.8.80x9ae1Standard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:58:16.497291088 CEST192.168.2.38.8.8.80xb2bdStandard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:58:22.992727995 CEST192.168.2.38.8.8.80xaff3Standard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:58:29.546488047 CEST192.168.2.38.8.8.80x4b78Standard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:58:36.256527901 CEST192.168.2.38.8.8.80x79d1Standard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:58:42.822968960 CEST192.168.2.38.8.8.80x9850Standard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              May 12, 2022 07:58:48.970896959 CEST192.168.2.38.8.8.80x91b7Standard query (0)khalil3131.ddns.netA (IP address)IN (0x0001)
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              May 12, 2022 07:56:50.524601936 CEST8.8.8.8192.168.2.30xec6dNo error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:57:00.590230942 CEST8.8.8.8192.168.2.30x4057No error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:57:07.587565899 CEST8.8.8.8192.168.2.30x54a4No error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:57:14.105559111 CEST8.8.8.8192.168.2.30x4379No error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:57:21.221888065 CEST8.8.8.8192.168.2.30xfab9No error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:57:27.682848930 CEST8.8.8.8192.168.2.30x9dc1No error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:57:35.138746023 CEST8.8.8.8192.168.2.30x64e8No error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:57:43.074953079 CEST8.8.8.8192.168.2.30x2ccaNo error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:57:49.643440962 CEST8.8.8.8192.168.2.30x1545No error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:57:57.018244982 CEST8.8.8.8192.168.2.30x7a8dNo error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:58:03.795254946 CEST8.8.8.8192.168.2.30x9baNo error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:58:08.415642977 CEST8.8.8.8192.168.2.30x9ae1No error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:58:16.518326998 CEST8.8.8.8192.168.2.30xb2bdNo error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:58:23.013859987 CEST8.8.8.8192.168.2.30xaff3No error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:58:29.566279888 CEST8.8.8.8192.168.2.30x4b78No error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:58:36.275990009 CEST8.8.8.8192.168.2.30x79d1No error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:58:42.840430975 CEST8.8.8.8192.168.2.30x9850No error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)
              May 12, 2022 07:58:48.990263939 CEST8.8.8.8192.168.2.30x91b7No error (0)khalil3131.ddns.net91.109.186.5A (IP address)IN (0x0001)

              Click to jump to process

              Target ID:0
              Start time:07:56:41
              Start date:12/05/2022
              Path:C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe"
              Imagebase:0xca0000
              File size:207872 bytes
              MD5 hash:DF1DC1A245D93014003E9ECC4F654602
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.545700012.0000000005860000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.545700012.0000000005860000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000000.00000002.545700012.0000000005860000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000000.00000002.546009139.0000000005F80000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.538786441.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.538786441.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.538786441.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000000.271804888.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000000.271804888.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000000.00000000.271804888.0000000000CA2000.00000002.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.545464811.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              Reputation:low

              Target ID:1
              Start time:07:56:43
              Start date:12/05/2022
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp187C.tmp
              Imagebase:0xb40000
              File size:185856 bytes
              MD5 hash:15FF7D8324231381BAD48A052F85DF04
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:2
              Start time:07:56:44
              Start date:12/05/2022
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7c9170000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:3
              Start time:07:56:46
              Start date:12/05/2022
              Path:C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe 0
              Imagebase:0x430000
              File size:207872 bytes
              MD5 hash:DF1DC1A245D93014003E9ECC4F654602
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.298371939.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.298371939.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000000.282231195.0000000000432000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000000.282231195.0000000000432000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000003.00000000.282231195.0000000000432000.00000002.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.297856567.0000000000432000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.297856567.0000000000432000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.297856567.0000000000432000.00000002.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.298492088.0000000003B01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.298492088.0000000003B01000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              Target ID:4
              Start time:07:56:46
              Start date:12/05/2022
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp21A4.tmp
              Imagebase:0xb40000
              File size:185856 bytes
              MD5 hash:15FF7D8324231381BAD48A052F85DF04
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:6
              Start time:07:56:48
              Start date:12/05/2022
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7c9170000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:9
              Start time:07:56:50
              Start date:12/05/2022
              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              Wow64 process (32bit):true
              Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
              Imagebase:0xdb0000
              File size:207872 bytes
              MD5 hash:DF1DC1A245D93014003E9ECC4F654602
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000000.291791981.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000000.291791981.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000009.00000000.291791981.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.312387842.0000000003461000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.312387842.0000000003461000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.311896346.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.311896346.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.311896346.0000000000DB2000.00000002.00000001.01000000.00000005.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.312592762.0000000004461000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.312592762.0000000004461000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Joe Security
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: ditekSHen
              • Rule: NanoCore, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
              Antivirus matches:
              • Detection: 100%, Avira
              • Detection: 100%, Joe Sandbox ML
              • Detection: 86%, Metadefender, Browse
              • Detection: 98%, ReversingLabs
              Reputation:low

              Target ID:11
              Start time:07:56:51
              Start date:12/05/2022
              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              Wow64 process (32bit):true
              Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
              Imagebase:0xd0000
              File size:207872 bytes
              MD5 hash:DF1DC1A245D93014003E9ECC4F654602
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000000.294404825.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000000.294404825.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000B.00000000.294404825.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.314675096.0000000002781000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.314675096.0000000002781000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.314132529.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.314132529.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.314132529.00000000000D2000.00000002.00000001.01000000.00000005.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.314708127.0000000003781000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.314708127.0000000003781000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              No disassembly