Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe

Overview

General Information

Sample Name:3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe
Analysis ID:679465
MD5:19230db458718df6fa70d9817925ac7a
SHA1:04eba42e98b996b5b9e1783e37de8b45c42d56f4
SHA256:3c0512176cbca3ce1b0abc5f505a3abbcd39909c20095d995f019197f42439d3
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Connects to many ports of the same IP (likely port scanning)
Protects its processes via BreakOnTermination flag
Machine Learning detection for sample
May check the online IP address of the machine
.NET source code contains potential unpacker
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports

Classification

  • System is w10x64
  • dhcpmon.exe (PID: 4428 cmdline: "C:\Program Files\DHCP Monitor\dhcpmon.exe" MD5: 19230DB458718DF6FA70D9817925AC7A)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "48fc9f6c-a1d6-42de-93fe-7ff2a24a", "Group": "New Connections", "Domain1": "trustedvpnconnection.anondns.net", "Domain2": "windowsmanager.freemyip.com", "Port": 38952, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Enable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000"}
SourceRuleDescriptionAuthorStrings
3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1018d:$x1: NanoCore.ClientPluginHost
  • 0x101ca:$x2: IClientNetworkHost
  • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xff05:$x1: NanoCore Client.exe
  • 0x1018d:$x2: NanoCore.ClientPluginHost
  • 0x117c6:$s1: PluginCommand
  • 0x117ba:$s2: FileCommand
  • 0x1266b:$s3: PipeExists
  • 0x18422:$s4: PipeCreated
  • 0x101b7:$s5: IClientLoggingHost
3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0xfef5:$x1: NanoCore Client
    • 0xff05:$x1: NanoCore Client
    • 0x1014d:$x2: NanoCore.ClientPlugin
    • 0x1018d:$x3: NanoCore.ClientPluginHost
    • 0x10142:$i1: IClientApp
    • 0x10163:$i2: IClientData
    • 0x1016f:$i3: IClientNetwork
    • 0x1017e:$i4: IClientAppHost
    • 0x101a7:$i5: IClientDataHost
    • 0x101b7:$i6: IClientLoggingHost
    • 0x101ca:$i7: IClientNetworkHost
    • 0x101dd:$i8: IClientUIHost
    • 0x101eb:$i9: IClientNameObjectCollection
    • 0x10207:$i10: IClientReadOnlyNameObjectCollection
    • 0xff54:$s1: ClientPlugin
    • 0x10156:$s1: ClientPlugin
    • 0x1064a:$s2: EndPoint
    • 0x10653:$s3: IPAddress
    • 0x1065d:$s4: IPEndPoint
    • 0x12093:$s6: get_ClientSettings
    • 0x12637:$s7: get_Connected
    3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfef5:$a: NanoCore
    • 0xff05:$a: NanoCore
    • 0x10139:$a: NanoCore
    • 0x1014d:$a: NanoCore
    • 0x1018d:$a: NanoCore
    • 0xff54:$b: ClientPlugin
    • 0x10156:$b: ClientPlugin
    • 0x10196:$b: ClientPlugin
    • 0x1007b:$c: ProjectData
    • 0x10a82:$d: DESCrypto
    • 0x1844e:$e: KeepAlive
    • 0x1643c:$g: LogClientMessage
    • 0x12637:$i: get_Connected
    • 0x10db8:$j: #=q
    • 0x10de8:$j: #=q
    • 0x10e04:$j: #=q
    • 0x10e34:$j: #=q
    • 0x10e50:$j: #=q
    • 0x10e6c:$j: #=q
    • 0x10e9c:$j: #=q
    • 0x10eb8:$j: #=q
    Click to see the 1 entries
    SourceRuleDescriptionAuthorStrings
    C:\Program Files\DHCP Monitor\dhcpmon.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    C:\Program Files\DHCP Monitor\dhcpmon.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xff05:$x1: NanoCore Client.exe
    • 0x1018d:$x2: NanoCore.ClientPluginHost
    • 0x117c6:$s1: PluginCommand
    • 0x117ba:$s2: FileCommand
    • 0x1266b:$s3: PipeExists
    • 0x18422:$s4: PipeCreated
    • 0x101b7:$s5: IClientLoggingHost
    C:\Program Files\DHCP Monitor\dhcpmon.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      C:\Program Files\DHCP Monitor\dhcpmon.exeMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xfef5:$x1: NanoCore Client
      • 0xff05:$x1: NanoCore Client
      • 0x1014d:$x2: NanoCore.ClientPlugin
      • 0x1018d:$x3: NanoCore.ClientPluginHost
      • 0x10142:$i1: IClientApp
      • 0x10163:$i2: IClientData
      • 0x1016f:$i3: IClientNetwork
      • 0x1017e:$i4: IClientAppHost
      • 0x101a7:$i5: IClientDataHost
      • 0x101b7:$i6: IClientLoggingHost
      • 0x101ca:$i7: IClientNetworkHost
      • 0x101dd:$i8: IClientUIHost
      • 0x101eb:$i9: IClientNameObjectCollection
      • 0x10207:$i10: IClientReadOnlyNameObjectCollection
      • 0xff54:$s1: ClientPlugin
      • 0x10156:$s1: ClientPlugin
      • 0x1064a:$s2: EndPoint
      • 0x10653:$s3: IPAddress
      • 0x1065d:$s4: IPEndPoint
      • 0x12093:$s6: get_ClientSettings
      • 0x12637:$s7: get_Connected
      C:\Program Files\DHCP Monitor\dhcpmon.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x1007b:$c: ProjectData
      • 0x10a82:$d: DESCrypto
      • 0x1844e:$e: KeepAlive
      • 0x1643c:$g: LogClientMessage
      • 0x12637:$i: get_Connected
      • 0x10db8:$j: #=q
      • 0x10de8:$j: #=q
      • 0x10e04:$j: #=q
      • 0x10e34:$j: #=q
      • 0x10e50:$j: #=q
      • 0x10e6c:$j: #=q
      • 0x10e9c:$j: #=q
      • 0x10eb8:$j: #=q
      Click to see the 1 entries
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xe38:$x2: NanoCore.ClientPlugin
      • 0xe75:$x3: NanoCore.ClientPluginHost
      • 0xe5a:$i1: IClientApp
      • 0xe4e:$i2: IClientData
      • 0xe29:$i3: IClientNetwork
      • 0xec3:$i4: IClientAppHost
      • 0xe65:$i5: IClientDataHost
      • 0xeb0:$i6: IClientLoggingHost
      • 0xe8f:$i7: IClientNetworkHost
      • 0xea2:$i8: IClientUIHost
      • 0xed2:$i9: IClientNameObjectCollection
      • 0xef7:$i10: IClientReadOnlyNameObjectCollection
      • 0xe41:$s1: ClientPlugin
      • 0x177c:$s1: ClientPlugin
      • 0x1789:$s1: ClientPlugin
      • 0x11f9:$s6: get_ClientSettings
      • 0x1249:$s7: get_Connected
      00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
      • 0xe75:$a1: NanoCore.ClientPluginHost
      • 0xe38:$a2: NanoCore.ClientPlugin
      • 0x120c:$b1: get_BuilderSettings
      • 0xec3:$b4: IClientAppHost
      • 0x127d:$b6: AddHostEntry
      • 0x12ec:$b7: LogClientException
      • 0x1261:$b8: PipeExists
      • 0xeb0:$b9: IClientLoggingHost
      00000000.00000000.334105407.0000000000BD2000.00000002.00000001.01000000.00000003.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xff8d:$x1: NanoCore.ClientPluginHost
      • 0xffca:$x2: IClientNetworkHost
      • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 27 entries
      SourceRuleDescriptionAuthorStrings
      0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
        • 0xfef5:$x1: NanoCore Client
        • 0xff05:$x1: NanoCore Client
        • 0x1014d:$x2: NanoCore.ClientPlugin
        • 0x1018d:$x3: NanoCore.ClientPluginHost
        • 0x10142:$i1: IClientApp
        • 0x10163:$i2: IClientData
        • 0x1016f:$i3: IClientNetwork
        • 0x1017e:$i4: IClientAppHost
        • 0x101a7:$i5: IClientDataHost
        • 0x101b7:$i6: IClientLoggingHost
        • 0x101ca:$i7: IClientNetworkHost
        • 0x101dd:$i8: IClientUIHost
        • 0x101eb:$i9: IClientNameObjectCollection
        • 0x10207:$i10: IClientReadOnlyNameObjectCollection
        • 0xff54:$s1: ClientPlugin
        • 0x10156:$s1: ClientPlugin
        • 0x1064a:$s2: EndPoint
        • 0x10653:$s3: IPAddress
        • 0x1065d:$s4: IPEndPoint
        • 0x12093:$s6: get_ClientSettings
        • 0x12637:$s7: get_Connected
        0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfef5:$a: NanoCore
        • 0xff05:$a: NanoCore
        • 0x10139:$a: NanoCore
        • 0x1014d:$a: NanoCore
        • 0x1018d:$a: NanoCore
        • 0xff54:$b: ClientPlugin
        • 0x10156:$b: ClientPlugin
        • 0x10196:$b: ClientPlugin
        • 0x1007b:$c: ProjectData
        • 0x10a82:$d: DESCrypto
        • 0x1844e:$e: KeepAlive
        • 0x1643c:$g: LogClientMessage
        • 0x12637:$i: get_Connected
        • 0x10db8:$j: #=q
        • 0x10de8:$j: #=q
        • 0x10e04:$j: #=q
        • 0x10e34:$j: #=q
        • 0x10e50:$j: #=q
        • 0x10e6c:$j: #=q
        • 0x10e9c:$j: #=q
        • 0x10eb8:$j: #=q
        Click to see the 81 entries

        AV Detection

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, ProcessId: 4484, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, ProcessId: 4484, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, ProcessId: 4484, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, ProcessId: 4484, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Timestamp:192.168.2.7107.150.23.18449849389522816766 08/05/22-20:40:14.466547
        SID:2816766
        Source Port:49849
        Destination Port:38952
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeVirustotal: Detection: 79%Perma Link
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeMetadefender: Detection: 88%Perma Link
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeReversingLabs: Detection: 100%
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeAvira: detected
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen7
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeMetadefender: Detection: 88%Perma Link
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 100%
        Source: Yara matchFile source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.2cde240.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.2ce3318.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.12c98235.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.2ce3318.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.12c9079e.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.12c955d4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc2c61.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.2ce5f79.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32dd541.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.12c955d4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32a6f48.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.334105407.0000000000BD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.400423708.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.400861737.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000003.343362385.000000001BE11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.605781173.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe PID: 4484, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4428, type: MEMORYSTR
        Source: Yara matchFile source: C:\Program Files\DHCP Monitor\dhcpmon.exe, type: DROPPED
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeJoe Sandbox ML: detected
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 00000003.00000002.400423708.0000000002C81000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "48fc9f6c-a1d6-42de-93fe-7ff2a24a", "Group": "New Connections", "Domain1": "trustedvpnconnection.anondns.net", "Domain2": "windowsmanager.freemyip.com", "Port": 38952, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Enable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000"}
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_88df21dd2faf7c49\MSVCR80.dll
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeDirectory created: C:\Program Files\DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeDirectory created: C:\Program Files\DHCP Monitor\dhcpmon.exeJump to behavior

        Networking

        barindex
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49849 -> 107.150.23.184:38952
        Source: global trafficTCP traffic: 103.240.234.185 ports 2,3,5,8,38952,9
        Source: global trafficTCP traffic: 107.150.23.184 ports 2,3,5,8,38952,9
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeDNS query: name: windowsmanager.freemyip.com
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeDNS query: name: windowsmanager.freemyip.com
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeDNS query: name: windowsmanager.freemyip.com
        Source: unknownDNS query: name: windowsmanager.freemyip.com
        Source: Malware configuration extractorURLs: windowsmanager.freemyip.com
        Source: Malware configuration extractorURLs: trustedvpnconnection.anondns.net
        Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
        Source: global trafficTCP traffic: 192.168.2.7:49768 -> 107.150.23.184:38952
        Source: global trafficTCP traffic: 192.168.2.7:49771 -> 103.240.234.185:38952
        Source: unknownDNS traffic detected: queries for: trustedvpnconnection.anondns.net
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.605781173.0000000003291000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputData

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.2cde240.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.2ce3318.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.12c98235.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.2ce3318.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.12c9079e.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.12c955d4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc2c61.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.2ce5f79.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32dd541.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.12c955d4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32a6f48.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.334105407.0000000000BD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.400423708.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.400861737.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000003.343362385.000000001BE11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.605781173.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe PID: 4484, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4428, type: MEMORYSTR
        Source: Yara matchFile source: C:\Program Files\DHCP Monitor\dhcpmon.exe, type: DROPPED

        Operating System Destruction

        barindex
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: 01 00 00 00

        System Summary

        barindex
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, type: SAMPLEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, type: SAMPLEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, type: SAMPLEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, type: SAMPLEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.dhcpmon.exe.2cde240.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 3.2.dhcpmon.exe.2cde240.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 3.2.dhcpmon.exe.2cde240.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1070000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1070000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1070000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 3.2.dhcpmon.exe.2ce3318.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.dhcpmon.exe.2ce3318.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 3.2.dhcpmon.exe.2ce3318.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 3.2.dhcpmon.exe.12c98235.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.dhcpmon.exe.12c98235.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 3.2.dhcpmon.exe.12c98235.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 3.2.dhcpmon.exe.2ce3318.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.dhcpmon.exe.2ce3318.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 3.2.dhcpmon.exe.2ce3318.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 3.2.dhcpmon.exe.12c9079e.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.dhcpmon.exe.12c9079e.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 3.2.dhcpmon.exe.12c9079e.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.2.dhcpmon.exe.12c9079e.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 3.2.dhcpmon.exe.12c955d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.dhcpmon.exe.12c955d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 3.2.dhcpmon.exe.12c955d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc2c61.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc2c61.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc2c61.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 3.2.dhcpmon.exe.2ce5f79.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.dhcpmon.exe.2ce5f79.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 3.2.dhcpmon.exe.2ce5f79.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32dd541.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32dd541.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32dd541.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 3.2.dhcpmon.exe.12c955d4.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.dhcpmon.exe.12c955d4.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 3.2.dhcpmon.exe.12c955d4.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32a6f48.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32a6f48.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32a6f48.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000000.00000000.334105407.0000000000BD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000000.334105407.0000000000BD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000000.334105407.0000000000BD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000003.00000002.400423708.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000003.00000002.400423708.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000003.00000002.400861737.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000003.00000002.400861737.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000000.00000003.343362385.000000001BE11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000003.343362385.000000001BE11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000003.343362385.000000001BE11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000000.00000002.605781173.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe PID: 4484, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe PID: 4484, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe PID: 4484, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: dhcpmon.exe PID: 4428, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 4428, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Detects NanoCore Author: ditekSHen
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, type: SAMPLEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, type: SAMPLEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, type: SAMPLEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, type: SAMPLEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, type: SAMPLEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.2.dhcpmon.exe.2cde240.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 3.2.dhcpmon.exe.2cde240.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.2.dhcpmon.exe.2cde240.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 3.2.dhcpmon.exe.2cde240.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1070000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1070000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1070000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1070000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 3.2.dhcpmon.exe.2ce3318.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.2.dhcpmon.exe.2ce3318.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.2.dhcpmon.exe.2ce3318.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 3.2.dhcpmon.exe.2ce3318.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 3.2.dhcpmon.exe.12c98235.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.2.dhcpmon.exe.12c98235.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.2.dhcpmon.exe.12c98235.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 3.2.dhcpmon.exe.12c98235.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 3.2.dhcpmon.exe.2ce3318.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.2.dhcpmon.exe.2ce3318.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.2.dhcpmon.exe.2ce3318.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 3.2.dhcpmon.exe.2ce3318.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 3.2.dhcpmon.exe.12c9079e.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.2.dhcpmon.exe.12c9079e.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.2.dhcpmon.exe.12c9079e.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 3.2.dhcpmon.exe.12c9079e.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.2.dhcpmon.exe.12c9079e.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 3.2.dhcpmon.exe.12c955d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.2.dhcpmon.exe.12c955d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.2.dhcpmon.exe.12c955d4.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 3.2.dhcpmon.exe.12c955d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc2c61.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc2c61.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc2c61.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc2c61.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 3.2.dhcpmon.exe.2ce5f79.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.2.dhcpmon.exe.2ce5f79.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.2.dhcpmon.exe.2ce5f79.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 3.2.dhcpmon.exe.2ce5f79.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32dd541.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32dd541.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32dd541.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32dd541.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 3.2.dhcpmon.exe.12c955d4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.2.dhcpmon.exe.12c955d4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.2.dhcpmon.exe.12c955d4.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 3.2.dhcpmon.exe.12c955d4.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32a6f48.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32a6f48.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32a6f48.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32a6f48.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000000.00000000.334105407.0000000000BD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000000.334105407.0000000000BD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000000.334105407.0000000000BD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000003.00000002.400423708.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000003.00000002.400423708.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000003.00000002.400861737.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000003.00000002.400861737.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000000.00000003.343362385.000000001BE11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000003.343362385.000000001BE11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000003.343362385.000000001BE11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000000.00000002.605781173.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe PID: 4484, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: Process Memory Space: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe PID: 4484, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe PID: 4484, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: dhcpmon.exe PID: 4428, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 4428, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeCode function: 0_2_00007FF8590C9A3D
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeCode function: 0_2_00007FF8590CED0A
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeCode function: 0_2_00007FF8590CADD5
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeCode function: 0_2_00007FF8590C41D1
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeCode function: 0_2_00007FF8590C1B71
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeCode function: 0_2_00007FF8590C4DAA
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeCode function: 0_2_00007FF8590C301D
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeCode function: 3_2_00007FF8590C1B71
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeCode function: 3_2_00007FF8590C41D1
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeCode function: 3_2_00007FF8590C4DAA
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeCode function: 3_2_00007FF8590C301D
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.605651544.0000000002E20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.610148456.00000000132B8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.602881180.00000000010B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.605781173.0000000003291000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.605781173.0000000003291000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.605781173.0000000003291000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeStatic PE information: Section: .rsrc ZLIB complexity 0.9952420112781954
        Source: dhcpmon.exe.0.drStatic PE information: Section: .rsrc ZLIB complexity 0.9952420112781954
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeVirustotal: Detection: 79%
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeMetadefender: Detection: 88%
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeReversingLabs: Detection: 100%
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeFile read: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeJump to behavior
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe "C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe"
        Source: unknownProcess created: C:\Program Files\DHCP Monitor\dhcpmon.exe "C:\Program Files\DHCP Monitor\dhcpmon.exe"
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeFile created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9AJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@2/4@10/2
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{48fc9f6c-a1d6-42de-93fe-7ff2a24a16fa}
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeFile created: C:\Program Files\DHCP MonitorJump to behavior
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: dhcpmon.exe.0.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: dhcpmon.exe.0.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dll
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_88df21dd2faf7c49\MSVCR80.dll
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeDirectory created: C:\Program Files\DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeDirectory created: C:\Program Files\DHCP Monitor\dhcpmon.exeJump to behavior

        Data Obfuscation

        barindex
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: dhcpmon.exe.0.dr, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: dhcpmon.exe.0.dr, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: dhcpmon.exe.0.dr, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeFile created: C:\Program Files\DHCP Monitor\dhcpmon.exeJump to dropped file
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DHCP MonitorJump to behavior

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeFile opened: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe TID: 784Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exe TID: 2892Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeWindow / User API: foregroundWindowGot 675
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.520186274.000000000119D000.00000004.00000020.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.605319418.000000000119D000.00000004.00000020.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.356493921.000000000119D000.00000004.00000020.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.355017461.0000000001190000.00000004.00000020.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.377610447.000000000119D000.00000004.00000020.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.378577400.000000000119D000.00000004.00000020.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.379557260.000000000119D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeMemory allocated: page read and write | page guard
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.611612417.000000001BE3B000.00000004.00000020.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.578604449.000000001BE3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerreemyip.comYD
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.462735221.000000001BE3A000.00000004.00000020.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.417334006.000000001BE38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager~D
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.608539232.0000000003501000.00000004.00000800.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.607181488.00000000033AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.611612417.000000001BE3B000.00000004.00000020.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.462735221.000000001BE3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managertion.anondns.net
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.462735221.000000001BE3A000.00000004.00000020.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.417334006.000000001BE38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManageruserDesktopenSurveillanceExClientPlugin.resources.EXE
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.462735221.000000001BE3A000.00000004.00000020.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.417334006.000000001BE38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerreemyip.comQE
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.611612417.000000001BE3B000.00000004.00000020.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.578604449.000000001BE3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerreemyip.com
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.462735221.000000001BE3A000.00000004.00000020.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.519999901.000000001BE3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managertion.anondns.net@
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.417334006.000000001BE38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managertion.anondns.netYD
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.578604449.000000001BE3A000.00000004.00000020.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.462735221.000000001BE3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerreemyip.com0E
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.578604449.000000001BE3A000.00000004.00000020.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.519999901.000000001BE3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.417334006.000000001BE38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managertion.anondns.netvE
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.611612417.000000001BE3B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managertion.anondns.netQE
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.608539232.0000000003501000.00000004.00000800.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.607181488.00000000033AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerxJ
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.611612417.000000001BE3B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managertion.anondns.net0E
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.611612417.000000001BE3B000.00000004.00000020.00020000.00000000.sdmp, 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.578604449.000000001BE3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerreemyip.com~D
        Source: C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.2cde240.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.2ce3318.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.12c98235.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.2ce3318.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.12c9079e.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.12c955d4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc2c61.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.2ce5f79.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32dd541.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.12c955d4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32a6f48.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.334105407.0000000000BD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.400423708.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.400861737.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000003.343362385.000000001BE11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.605781173.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe PID: 4484, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4428, type: MEMORYSTR
        Source: Yara matchFile source: C:\Program Files\DHCP Monitor\dhcpmon.exe, type: DROPPED

        Remote Access Functionality

        barindex
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000000.334105407.0000000000BD2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000003.343362385.000000001BE11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.605781173.0000000003291000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.605781173.0000000003291000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000003.00000002.400423708.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000003.00000002.400423708.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 00000003.00000002.400861737.0000000012C90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000003.00000002.400861737.0000000012C90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exeString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe.0.drString found in binary or memory: NanoCore.ClientPluginHost
        Source: Yara matchFile source: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.2cde240.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.2ce3318.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.12c98235.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.2ce3318.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.12c9079e.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.12c955d4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.1bdc2c61.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32da8e0.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.2ce5f79.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32dd541.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.dhcpmon.exe.12c955d4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.32a6f48.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.334105407.0000000000BD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.400423708.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.400861737.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000003.343362385.000000001BE11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.605781173.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe PID: 4484, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4428, type: MEMORYSTR
        Source: Yara matchFile source: C:\Program Files\DHCP Monitor\dhcpmon.exe, type: DROPPED
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation1
        Registry Run Keys / Startup Folder
        2
        Process Injection
        3
        Masquerading
        11
        Input Capture
        11
        Security Software Discovery
        Remote Services11
        Input Capture
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Registry Run Keys / Startup Folder
        1
        Disable or Modify Tools
        LSASS Memory2
        Process Discovery
        Remote Desktop Protocol11
        Archive Collected Data
        Exfiltration Over Bluetooth1
        Non-Standard Port
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
        Virtualization/Sandbox Evasion
        Security Account Manager21
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
        Remote Access Software
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
        Process Injection
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureScheduled Transfer1
        Non-Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Deobfuscate/Decode Files or Information
        LSA Secrets1
        Remote System Discovery
        SSHKeyloggingData Transfer Size Limits11
        Application Layer Protocol
        Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common1
        Hidden Files and Directories
        Cached Domain Credentials1
        System Network Configuration Discovery
        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup Items12
        Software Packing
        DCSync2
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe80%VirustotalBrowse
        3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe89%MetadefenderBrowse
        3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe100%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
        3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe100%AviraTR/Dropper.MSIL.Gen7
        3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Program Files\DHCP Monitor\dhcpmon.exe100%AviraTR/Dropper.MSIL.Gen7
        C:\Program Files\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Program Files\DHCP Monitor\dhcpmon.exe89%MetadefenderBrowse
        C:\Program Files\DHCP Monitor\dhcpmon.exe100%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
        SourceDetectionScannerLabelLinkDownload
        0.0.3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe.bd0000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        SourceDetectionScannerLabelLink
        trustedvpnconnection.anondns.net2%VirustotalBrowse
        SourceDetectionScannerLabelLink
        trustedvpnconnection.anondns.net0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        trustedvpnconnection.anondns.net
        107.150.23.184
        truetrueunknown
        windowsmanager.freemyip.com
        103.240.234.185
        truefalse
          high
          NameMaliciousAntivirus DetectionReputation
          windowsmanager.freemyip.comfalse
            high
            trustedvpnconnection.anondns.nettrue
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            103.240.234.185
            windowsmanager.freemyip.comIndia
            132453TRIPLE-PLAY-INTRIPLEPLAYBROADBANDPRIVATELIMITEDINfalse
            107.150.23.184
            trustedvpnconnection.anondns.netUnited States
            8100ASN-QUADRANET-GLOBALUStrue
            Joe Sandbox Version:35.0.0 Citrine
            Analysis ID:679465
            Start date and time: 05/08/202220:37:162022-08-05 20:37:16 +02:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 6m 1s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:17
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@2/4@10/2
            EGA Information:Failed
            HDC Information:Failed
            HCA Information:
            • Successful, ratio: 94%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Adjust boot time
            • Enable AMSI
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
            • Excluded IPs from analysis (whitelisted): 23.211.6.115
            • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, client.wns.windows.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
            • Execution Graph export aborted for target 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe, PID 4484 because it is empty
            • Execution Graph export aborted for target dhcpmon.exe, PID 4428 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            TimeTypeDescription
            20:38:25API Interceptor581x Sleep call for process: 3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe modified
            20:38:26AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files\DHCP Monitor\dhcpmon.exe
            No context
            No context
            No context
            No context
            No context
            Process:C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):185856
            Entropy (8bit):7.338133299220304
            Encrypted:false
            SSDEEP:3072:GzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HISp9Jzf+hpWavwPJLehxm:GLV6Bta6dtJmakIM5PJr+hz2JGm
            MD5:19230DB458718DF6FA70D9817925AC7A
            SHA1:04EBA42E98B996B5B9E1783E37DE8B45C42D56F4
            SHA-256:3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095D995F019197F42439D3
            SHA-512:81B7C7E56D37AC11294EC815CA90E84C528385941CAF410F205AE6C181CA5E7A47E4DD8D572DF9E5E6AC3A0CAF58768D6049755C030AA67B8B2101B7AF401712
            Malicious:true
            Yara Hits:
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, Author: Joe Security
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, Author: ditekSHen
            • Rule: NanoCore, Description: unknown, Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, Author: unknown
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Metadefender, Detection: 89%, Browse
            • Antivirus: ReversingLabs, Detection: 100%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T................................. ........@.. .......................@..............................................8...W.... ..`............................................................................ ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc...`.... ......................@..@................t.......H...........T............................................................0..Q........o5.......*.o6....-.&......3+..+.... ....3......1..... 2.... ....3.... .......*.*....0..E.......s7....-(&s8....-&&s9....,$&s:........s;........*.....+.....+.....+.....0..........~....o<...*..0..........~....o=...*..0..........~....o>...*..0..........~....o?...*..0..........~....o@...*..0.............-.&(A...*&+...0..$.......~B........-.(...+.-.&+..B...+.~B...*.0.............-.&(A...*&+...0..
            Process:C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe
            File Type:ASCII text, with CRLF line terminators
            Category:modified
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:true
            Reputation:high, very likely benign file
            Preview:[ZoneTransfer]....ZoneId=0
            Process:C:\Program Files\DHCP Monitor\dhcpmon.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):525
            Entropy (8bit):5.278948378331044
            Encrypted:false
            SSDEEP:12:Q3LaJcP0kaHYGLi1B01kKVdisk70/9UkB9tv:MLfaYgioQcpBT
            MD5:9AF7671D4ABE5659B81446667F85255E
            SHA1:4EEB5A2CD0A635EEDE03D35E56A6DE775A61761C
            SHA-256:6EA3C77011EEF418C5D3D2B00D1E4602390CB747B347AB8542A89AAD6136779A
            SHA-512:CAB4891DB9592138F748A59DC44E82BF9664CDF80084B982BE2BEE2DEC57CA26AE71C9B10F2AF9944B86579F89D44660851C0AAC25BFB13ACF719612A25B854B
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System\1201f26cb986c93f55044bb4fa22b294\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Drawing\b12bbcf27f41d96fe44360ae0b566f9b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Windows.Forms\454c09ea87bde1d5f545d60232083b79\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualBas#\76002c3c0a2b9f0c8687ad35e8d9d309\Microsoft.VisualBasic.ni.dll",0..
            Process:C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe
            File Type:data
            Category:dropped
            Size (bytes):8
            Entropy (8bit):3.0
            Encrypted:false
            SSDEEP:3:hStn:hStn
            MD5:DE177069969E9BB8B4758569EEBE9897
            SHA1:AC6645CC17D55DEA53696245DE5F0B3494DFD7CB
            SHA-256:2B3A2465A7F72968FBE13C3DA46DCD69C804AF529D809F9B48030A67BC4D2096
            SHA-512:41692E87D0092D470527B7A164C9858F86DED52D74DDA3F4C521EF43FB4473C39DA6848B7260A16F567E4A2736B29D846A6FD430EBBC2D51BA275EF4289E5F34
            Malicious:true
            Reputation:low
            Preview:U...]w.H
            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Entropy (8bit):7.338133299220304
            TrID:
            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            • Win32 Executable (generic) a (10002005/4) 49.78%
            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
            • Generic Win/DOS Executable (2004/3) 0.01%
            • DOS Executable Generic (2002/1) 0.01%
            File name:3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe
            File size:185856
            MD5:19230db458718df6fa70d9817925ac7a
            SHA1:04eba42e98b996b5b9e1783e37de8b45c42d56f4
            SHA256:3c0512176cbca3ce1b0abc5f505a3abbcd39909c20095d995f019197f42439d3
            SHA512:81b7c7e56d37ac11294ec815ca90e84c528385941caf410f205ae6c181ca5e7a47e4dd8d572df9e5e6ac3a0caf58768d6049755c030aa67b8b2101b7af401712
            SSDEEP:3072:GzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HISp9Jzf+hpWavwPJLehxm:GLV6Bta6dtJmakIM5PJr+hz2JGm
            TLSH:F704BE167BA98A3FE2DE8679611202138379C2E398D3F3EE28D415B74F527E40A471D7
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T................................. ........@.. .......................@.............................................
            Icon Hash:00828e8e8686b000
            Entrypoint:0x41e792
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            DLL Characteristics:
            Time Stamp:0x54E927A1 [Sun Feb 22 00:49:37 2015 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
            Instruction
            jmp dword ptr [00402000h]
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x1e7380x57.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x10860.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x200000xc.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x20000x1c7980x1c800False0.5944867050438597data6.598052977750881IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .reloc0x200000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            .rsrc0x220000x108600x10a00False0.9952420112781954data7.996067726488766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountry
            RT_RCDATA0x220580x10808TIM image, Pixel at (39306,49598) Size=36835x31543
            DLLImport
            mscoree.dll_CorExeMain
            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
            192.168.2.7107.150.23.18449849389522816766 08/05/22-20:40:14.466547TCP2816766ETPRO TROJAN NanoCore RAT CnC 74984938952192.168.2.7107.150.23.184
            TimestampSource PortDest PortSource IPDest IP
            Aug 5, 2022 20:38:28.829078913 CEST4976838952192.168.2.7107.150.23.184
            Aug 5, 2022 20:38:28.968051910 CEST3895249768107.150.23.184192.168.2.7
            Aug 5, 2022 20:38:28.968183994 CEST4976838952192.168.2.7107.150.23.184
            Aug 5, 2022 20:38:29.106542110 CEST3895249768107.150.23.184192.168.2.7
            Aug 5, 2022 20:38:29.106643915 CEST4976838952192.168.2.7107.150.23.184
            Aug 5, 2022 20:38:30.610466003 CEST4976838952192.168.2.7107.150.23.184
            Aug 5, 2022 20:38:30.614809990 CEST4976838952192.168.2.7107.150.23.184
            Aug 5, 2022 20:38:30.748557091 CEST3895249768107.150.23.184192.168.2.7
            Aug 5, 2022 20:38:41.015100956 CEST4976938952192.168.2.7107.150.23.184
            Aug 5, 2022 20:38:41.150487900 CEST3895249769107.150.23.184192.168.2.7
            Aug 5, 2022 20:38:41.150779009 CEST4976938952192.168.2.7107.150.23.184
            Aug 5, 2022 20:38:41.154351950 CEST4976938952192.168.2.7107.150.23.184
            Aug 5, 2022 20:38:41.285633087 CEST3895249769107.150.23.184192.168.2.7
            Aug 5, 2022 20:38:41.285876036 CEST4976938952192.168.2.7107.150.23.184
            Aug 5, 2022 20:38:41.288777113 CEST3895249769107.150.23.184192.168.2.7
            Aug 5, 2022 20:38:41.420459986 CEST3895249769107.150.23.184192.168.2.7
            Aug 5, 2022 20:38:45.701688051 CEST4977038952192.168.2.7107.150.23.184
            Aug 5, 2022 20:38:45.839704990 CEST3895249770107.150.23.184192.168.2.7
            Aug 5, 2022 20:38:45.839844942 CEST4977038952192.168.2.7107.150.23.184
            Aug 5, 2022 20:38:45.840534925 CEST4977038952192.168.2.7107.150.23.184
            Aug 5, 2022 20:38:45.977673054 CEST3895249770107.150.23.184192.168.2.7
            Aug 5, 2022 20:38:45.977773905 CEST4977038952192.168.2.7107.150.23.184
            Aug 5, 2022 20:38:45.977945089 CEST4977038952192.168.2.7107.150.23.184
            Aug 5, 2022 20:38:45.978037119 CEST3895249770107.150.23.184192.168.2.7
            Aug 5, 2022 20:38:46.117453098 CEST3895249770107.150.23.184192.168.2.7
            Aug 5, 2022 20:38:50.408772945 CEST4977138952192.168.2.7103.240.234.185
            Aug 5, 2022 20:38:53.431035995 CEST4977138952192.168.2.7103.240.234.185
            Aug 5, 2022 20:38:59.431571960 CEST4977138952192.168.2.7103.240.234.185
            Aug 5, 2022 20:39:19.419148922 CEST4979538952192.168.2.7103.240.234.185
            Aug 5, 2022 20:39:22.433531046 CEST4979538952192.168.2.7103.240.234.185
            Aug 5, 2022 20:39:28.449608088 CEST4979538952192.168.2.7103.240.234.185
            Aug 5, 2022 20:39:46.517293930 CEST4980138952192.168.2.7103.240.234.185
            Aug 5, 2022 20:39:49.529542923 CEST4980138952192.168.2.7103.240.234.185
            Aug 5, 2022 20:39:55.530047894 CEST4980138952192.168.2.7103.240.234.185
            Aug 5, 2022 20:40:13.142242908 CEST4984938952192.168.2.7107.150.23.184
            Aug 5, 2022 20:40:13.298645973 CEST3895249849107.150.23.184192.168.2.7
            Aug 5, 2022 20:40:13.299547911 CEST4984938952192.168.2.7107.150.23.184
            Aug 5, 2022 20:40:13.437721014 CEST3895249849107.150.23.184192.168.2.7
            Aug 5, 2022 20:40:13.438057899 CEST4984938952192.168.2.7107.150.23.184
            Aug 5, 2022 20:40:14.466547012 CEST4984938952192.168.2.7107.150.23.184
            Aug 5, 2022 20:40:14.470855951 CEST4984938952192.168.2.7107.150.23.184
            Aug 5, 2022 20:40:14.604657888 CEST3895249849107.150.23.184192.168.2.7
            Aug 5, 2022 20:40:18.694559097 CEST4985238952192.168.2.7107.150.23.184
            Aug 5, 2022 20:40:18.832927942 CEST3895249852107.150.23.184192.168.2.7
            Aug 5, 2022 20:40:18.833086014 CEST4985238952192.168.2.7107.150.23.184
            Aug 5, 2022 20:40:18.836261988 CEST4985238952192.168.2.7107.150.23.184
            Aug 5, 2022 20:40:18.971246004 CEST3895249852107.150.23.184192.168.2.7
            Aug 5, 2022 20:40:18.971388102 CEST4985238952192.168.2.7107.150.23.184
            Aug 5, 2022 20:40:18.974176884 CEST3895249852107.150.23.184192.168.2.7
            Aug 5, 2022 20:40:19.109217882 CEST3895249852107.150.23.184192.168.2.7
            Aug 5, 2022 20:40:23.113821983 CEST4985738952192.168.2.7107.150.23.184
            Aug 5, 2022 20:40:23.250895023 CEST3895249857107.150.23.184192.168.2.7
            Aug 5, 2022 20:40:23.251301050 CEST4985738952192.168.2.7107.150.23.184
            Aug 5, 2022 20:40:23.258479118 CEST4985738952192.168.2.7107.150.23.184
            Aug 5, 2022 20:40:23.388638020 CEST3895249857107.150.23.184192.168.2.7
            Aug 5, 2022 20:40:23.389893055 CEST4985738952192.168.2.7107.150.23.184
            Aug 5, 2022 20:40:23.390088081 CEST4985738952192.168.2.7107.150.23.184
            Aug 5, 2022 20:40:23.395747900 CEST3895249857107.150.23.184192.168.2.7
            Aug 5, 2022 20:40:23.526555061 CEST3895249857107.150.23.184192.168.2.7
            Aug 5, 2022 20:40:27.595036983 CEST4986238952192.168.2.7103.240.234.185
            Aug 5, 2022 20:40:30.745759964 CEST4986238952192.168.2.7103.240.234.185
            Aug 5, 2022 20:40:36.761852026 CEST4986238952192.168.2.7103.240.234.185
            TimestampSource PortDest PortSource IPDest IP
            Aug 5, 2022 20:38:28.789407969 CEST6033553192.168.2.78.8.8.8
            Aug 5, 2022 20:38:28.808698893 CEST53603358.8.8.8192.168.2.7
            Aug 5, 2022 20:38:40.773046970 CEST6097853192.168.2.78.8.8.8
            Aug 5, 2022 20:38:40.792588949 CEST53609788.8.8.8192.168.2.7
            Aug 5, 2022 20:38:45.671798944 CEST6355753192.168.2.78.8.8.8
            Aug 5, 2022 20:38:45.700026035 CEST53635578.8.8.8192.168.2.7
            Aug 5, 2022 20:38:50.213223934 CEST6099653192.168.2.78.8.8.8
            Aug 5, 2022 20:38:50.405513048 CEST53609968.8.8.8192.168.2.7
            Aug 5, 2022 20:39:19.397521973 CEST6498053192.168.2.78.8.8.8
            Aug 5, 2022 20:39:19.416487932 CEST53649808.8.8.8192.168.2.7
            Aug 5, 2022 20:39:46.329189062 CEST5985653192.168.2.78.8.8.8
            Aug 5, 2022 20:39:46.515556097 CEST53598568.8.8.8192.168.2.7
            Aug 5, 2022 20:40:13.109174967 CEST5987453192.168.2.78.8.8.8
            Aug 5, 2022 20:40:13.138044119 CEST53598748.8.8.8192.168.2.7
            Aug 5, 2022 20:40:18.658930063 CEST6271153192.168.2.78.8.8.8
            Aug 5, 2022 20:40:18.692895889 CEST53627118.8.8.8192.168.2.7
            Aug 5, 2022 20:40:23.092725992 CEST4917053192.168.2.78.8.8.8
            Aug 5, 2022 20:40:23.112503052 CEST53491708.8.8.8192.168.2.7
            Aug 5, 2022 20:40:27.403865099 CEST6238153192.168.2.78.8.8.8
            Aug 5, 2022 20:40:27.594279051 CEST53623818.8.8.8192.168.2.7
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
            Aug 5, 2022 20:38:28.789407969 CEST192.168.2.78.8.8.80xbd92Standard query (0)trustedvpnconnection.anondns.netA (IP address)IN (0x0001)
            Aug 5, 2022 20:38:40.773046970 CEST192.168.2.78.8.8.80xd24fStandard query (0)trustedvpnconnection.anondns.netA (IP address)IN (0x0001)
            Aug 5, 2022 20:38:45.671798944 CEST192.168.2.78.8.8.80xb572Standard query (0)trustedvpnconnection.anondns.netA (IP address)IN (0x0001)
            Aug 5, 2022 20:38:50.213223934 CEST192.168.2.78.8.8.80x49c3Standard query (0)windowsmanager.freemyip.comA (IP address)IN (0x0001)
            Aug 5, 2022 20:39:19.397521973 CEST192.168.2.78.8.8.80x6697Standard query (0)windowsmanager.freemyip.comA (IP address)IN (0x0001)
            Aug 5, 2022 20:39:46.329189062 CEST192.168.2.78.8.8.80xb66Standard query (0)windowsmanager.freemyip.comA (IP address)IN (0x0001)
            Aug 5, 2022 20:40:13.109174967 CEST192.168.2.78.8.8.80xe3e5Standard query (0)trustedvpnconnection.anondns.netA (IP address)IN (0x0001)
            Aug 5, 2022 20:40:18.658930063 CEST192.168.2.78.8.8.80x1718Standard query (0)trustedvpnconnection.anondns.netA (IP address)IN (0x0001)
            Aug 5, 2022 20:40:23.092725992 CEST192.168.2.78.8.8.80x3794Standard query (0)trustedvpnconnection.anondns.netA (IP address)IN (0x0001)
            Aug 5, 2022 20:40:27.403865099 CEST192.168.2.78.8.8.80xbfceStandard query (0)windowsmanager.freemyip.comA (IP address)IN (0x0001)
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
            Aug 5, 2022 20:38:28.808698893 CEST8.8.8.8192.168.2.70xbd92No error (0)trustedvpnconnection.anondns.net107.150.23.184A (IP address)IN (0x0001)
            Aug 5, 2022 20:38:40.792588949 CEST8.8.8.8192.168.2.70xd24fNo error (0)trustedvpnconnection.anondns.net107.150.23.184A (IP address)IN (0x0001)
            Aug 5, 2022 20:38:45.700026035 CEST8.8.8.8192.168.2.70xb572No error (0)trustedvpnconnection.anondns.net107.150.23.184A (IP address)IN (0x0001)
            Aug 5, 2022 20:38:50.405513048 CEST8.8.8.8192.168.2.70x49c3No error (0)windowsmanager.freemyip.com103.240.234.185A (IP address)IN (0x0001)
            Aug 5, 2022 20:39:19.416487932 CEST8.8.8.8192.168.2.70x6697No error (0)windowsmanager.freemyip.com103.240.234.185A (IP address)IN (0x0001)
            Aug 5, 2022 20:39:46.515556097 CEST8.8.8.8192.168.2.70xb66No error (0)windowsmanager.freemyip.com103.240.234.185A (IP address)IN (0x0001)
            Aug 5, 2022 20:40:13.138044119 CEST8.8.8.8192.168.2.70xe3e5No error (0)trustedvpnconnection.anondns.net107.150.23.184A (IP address)IN (0x0001)
            Aug 5, 2022 20:40:18.692895889 CEST8.8.8.8192.168.2.70x1718No error (0)trustedvpnconnection.anondns.net107.150.23.184A (IP address)IN (0x0001)
            Aug 5, 2022 20:40:23.112503052 CEST8.8.8.8192.168.2.70x3794No error (0)trustedvpnconnection.anondns.net107.150.23.184A (IP address)IN (0x0001)
            Aug 5, 2022 20:40:27.594279051 CEST8.8.8.8192.168.2.70xbfceNo error (0)windowsmanager.freemyip.com103.240.234.185A (IP address)IN (0x0001)

            Click to jump to process

            Target ID:0
            Start time:20:38:19
            Start date:05/08/2022
            Path:C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\Desktop\3C0512176CBCA3CE1B0ABC5F505A3ABBCD39909C20095.exe"
            Imagebase:0xbd0000
            File size:185856 bytes
            MD5 hash:19230DB458718DF6FA70D9817925AC7A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.602638271.0000000001070000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000000.334105407.0000000000BD2000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000000.334105407.0000000000BD2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000000.00000000.334105407.0000000000BD2000.00000002.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000000.334105407.0000000000BD2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000003.343362385.000000001BE11000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000003.343362385.000000001BE11000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.343362385.000000001BE11000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000003.343362385.000000001BE11000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.611316790.000000001BDC0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.605781173.0000000003291000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.605781173.0000000003291000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            Reputation:low

            Target ID:3
            Start time:20:38:35
            Start date:05/08/2022
            Path:C:\Program Files\DHCP Monitor\dhcpmon.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\DHCP Monitor\dhcpmon.exe"
            Imagebase:0x700000
            File size:185856 bytes
            MD5 hash:19230DB458718DF6FA70D9817925AC7A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.400423708.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.400423708.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.400423708.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.400861737.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.400861737.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.400861737.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, Author: Joe Security
            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, Author: ditekSHen
            • Rule: NanoCore, Description: unknown, Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: C:\Program Files\DHCP Monitor\dhcpmon.exe, Author: unknown
            Antivirus matches:
            • Detection: 100%, Avira
            • Detection: 100%, Joe Sandbox ML
            • Detection: 89%, Metadefender, Browse
            • Detection: 100%, ReversingLabs
            Reputation:low

            No disassembly