Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SdwkQEBnc3.exe

Overview

General Information

Sample Name:SdwkQEBnc3.exe
Analysis ID:709347
MD5:33851c19216f0e65db0aecc27dc71ffc
SHA1:0ad881c7d507bea247bfe454e29bc645f3d1b4ac
SHA256:d3c3718f2106aca6ed10bb92ec37e99bcadd8536f499af4de3849625a0a1c109
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Machine Learning detection for sample
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports

Classification

  • System is w10x64
  • SdwkQEBnc3.exe (PID: 5128 cmdline: "C:\Users\user\Desktop\SdwkQEBnc3.exe" MD5: 33851C19216F0E65DB0AECC27DC71FFC)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "7fd0fb12-397b-455a-940b-bef9261b", "Group": "kurban", "Domain1": "eu-central-7075.packetriot.net", "Domain2": "127.0.0.1", "Port": 22378, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
SdwkQEBnc3.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1018d:$x1: NanoCore.ClientPluginHost
  • 0x101ca:$x2: IClientNetworkHost
  • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
SdwkQEBnc3.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xff05:$x1: NanoCore Client.exe
  • 0x1018d:$x2: NanoCore.ClientPluginHost
  • 0x117c6:$s1: PluginCommand
  • 0x117ba:$s2: FileCommand
  • 0x1266b:$s3: PipeExists
  • 0x18422:$s4: PipeCreated
  • 0x101b7:$s5: IClientLoggingHost
SdwkQEBnc3.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    SdwkQEBnc3.exeMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0xfef5:$x1: NanoCore Client
    • 0xff05:$x1: NanoCore Client
    • 0x1014d:$x2: NanoCore.ClientPlugin
    • 0x1018d:$x3: NanoCore.ClientPluginHost
    • 0x10142:$i1: IClientApp
    • 0x10163:$i2: IClientData
    • 0x1016f:$i3: IClientNetwork
    • 0x1017e:$i4: IClientAppHost
    • 0x101a7:$i5: IClientDataHost
    • 0x101b7:$i6: IClientLoggingHost
    • 0x101ca:$i7: IClientNetworkHost
    • 0x101dd:$i8: IClientUIHost
    • 0x101eb:$i9: IClientNameObjectCollection
    • 0x10207:$i10: IClientReadOnlyNameObjectCollection
    • 0xff54:$s1: ClientPlugin
    • 0x10156:$s1: ClientPlugin
    • 0x1064a:$s2: EndPoint
    • 0x10653:$s3: IPAddress
    • 0x1065d:$s4: IPEndPoint
    • 0x12093:$s6: get_ClientSettings
    • 0x12637:$s7: get_Connected
    SdwkQEBnc3.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfef5:$a: NanoCore
    • 0xff05:$a: NanoCore
    • 0x10139:$a: NanoCore
    • 0x1014d:$a: NanoCore
    • 0x1018d:$a: NanoCore
    • 0xff54:$b: ClientPlugin
    • 0x10156:$b: ClientPlugin
    • 0x10196:$b: ClientPlugin
    • 0x1007b:$c: ProjectData
    • 0x10a82:$d: DESCrypto
    • 0x1844e:$e: KeepAlive
    • 0x1643c:$g: LogClientMessage
    • 0x12637:$i: get_Connected
    • 0x10db8:$j: #=q
    • 0x10de8:$j: #=q
    • 0x10e04:$j: #=q
    • 0x10e34:$j: #=q
    • 0x10e50:$j: #=q
    • 0x10e6c:$j: #=q
    • 0x10e9c:$j: #=q
    • 0x10eb8:$j: #=q
    Click to see the 1 entries
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfcf5:$a: NanoCore
      • 0xfd05:$a: NanoCore
      • 0xff39:$a: NanoCore
      • 0xff4d:$a: NanoCore
      • 0xff8d:$a: NanoCore
      • 0xfd54:$b: ClientPlugin
      • 0xff56:$b: ClientPlugin
      • 0xff96:$b: ClientPlugin
      • 0xfe7b:$c: ProjectData
      • 0x10882:$d: DESCrypto
      • 0x1824e:$e: KeepAlive
      • 0x1623c:$g: LogClientMessage
      • 0x12437:$i: get_Connected
      • 0x10bb8:$j: #=q
      • 0x10be8:$j: #=q
      • 0x10c04:$j: #=q
      • 0x10c34:$j: #=q
      • 0x10c50:$j: #=q
      • 0x10c6c:$j: #=q
      • 0x10c9c:$j: #=q
      • 0x10cb8:$j: #=q
      00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
      • 0xff8d:$a1: NanoCore.ClientPluginHost
      • 0xff4d:$a2: NanoCore.ClientPlugin
      • 0x11ea6:$b1: get_BuilderSettings
      • 0xfda9:$b2: ClientLoaderForm.resources
      • 0x115c6:$b3: PluginCommand
      • 0xff7e:$b4: IClientAppHost
      • 0x1a3fe:$b5: GetBlockHash
      • 0x124fe:$b6: AddHostEntry
      • 0x161f1:$b7: LogClientException
      • 0x1246b:$b8: PipeExists
      • 0xffb7:$b9: IClientLoggingHost
      00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 16 entries
        SourceRuleDescriptionAuthorStrings
        0.2.SdwkQEBnc3.exe.463e424.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xd9ad:$x1: NanoCore.ClientPluginHost
        • 0xd9da:$x2: IClientNetworkHost
        0.2.SdwkQEBnc3.exe.463e424.3.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xd9ad:$x2: NanoCore.ClientPluginHost
        • 0xea88:$s4: PipeCreated
        • 0xd9c7:$s5: IClientLoggingHost
        0.2.SdwkQEBnc3.exe.463e424.3.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          0.2.SdwkQEBnc3.exe.463e424.3.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
          • 0xd978:$x2: NanoCore.ClientPlugin
          • 0xd9ad:$x3: NanoCore.ClientPluginHost
          • 0xd96c:$i2: IClientData
          • 0xd98e:$i3: IClientNetwork
          • 0xd99d:$i5: IClientDataHost
          • 0xd9c7:$i6: IClientLoggingHost
          • 0xd9da:$i7: IClientNetworkHost
          • 0xd9ed:$i8: IClientUIHost
          • 0xd9fb:$i9: IClientNameObjectCollection
          • 0xda17:$i10: IClientReadOnlyNameObjectCollection
          • 0xd76a:$s1: ClientPlugin
          • 0xd981:$s1: ClientPlugin
          • 0x129a2:$s6: get_ClientSettings
          0.2.SdwkQEBnc3.exe.463e424.3.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
          • 0xd9ad:$a1: NanoCore.ClientPluginHost
          • 0xd978:$a2: NanoCore.ClientPlugin
          • 0x128f3:$b1: get_BuilderSettings
          • 0x12862:$b7: LogClientException
          • 0xd9c7:$b9: IClientLoggingHost
          Click to see the 45 entries

          AV Detection

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SdwkQEBnc3.exe, ProcessId: 5128, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          E-Banking Fraud

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SdwkQEBnc3.exe, ProcessId: 5128, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Stealing of Sensitive Information

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SdwkQEBnc3.exe, ProcessId: 5128, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Remote Access Functionality

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SdwkQEBnc3.exe, ProcessId: 5128, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
          Timestamp:192.168.2.3167.71.56.11649729223782025019 09/25/22-10:39:19.021240
          SID:2025019
          Source Port:49729
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649708223782025019 09/25/22-10:37:58.335400
          SID:2025019
          Source Port:49708
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649719223782025019 09/25/22-10:38:45.572488
          SID:2025019
          Source Port:49719
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649728223782025019 09/25/22-10:39:13.005416
          SID:2025019
          Source Port:49728
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649723223782025019 09/25/22-10:39:06.622577
          SID:2025019
          Source Port:49723
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649709223782025019 09/25/22-10:38:04.391752
          SID:2025019
          Source Port:49709
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649712223782025019 09/25/22-10:38:11.114012
          SID:2025019
          Source Port:49712
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649723223782816766 09/25/22-10:39:08.421800
          SID:2816766
          Source Port:49723
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649733223782816766 09/25/22-10:39:42.564776
          SID:2816766
          Source Port:49733
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649712223782816766 09/25/22-10:38:14.198704
          SID:2816766
          Source Port:49712
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649737223782025019 09/25/22-10:39:46.930085
          SID:2025019
          Source Port:49737
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649716223782025019 09/25/22-10:38:33.571963
          SID:2025019
          Source Port:49716
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649717223782025019 09/25/22-10:38:39.534899
          SID:2025019
          Source Port:49717
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649708223782816718 09/25/22-10:37:59.384612
          SID:2816718
          Source Port:49708
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649716223782816766 09/25/22-10:38:35.293304
          SID:2816766
          Source Port:49716
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649737223782816766 09/25/22-10:39:48.190268
          SID:2816766
          Source Port:49737
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649729223782816766 09/25/22-10:39:20.875554
          SID:2816766
          Source Port:49729
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649719223782816766 09/25/22-10:38:47.309965
          SID:2816766
          Source Port:49719
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649708223782816766 09/25/22-10:38:00.056144
          SID:2816766
          Source Port:49708
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649717223782816766 09/25/22-10:38:41.356311
          SID:2816766
          Source Port:49717
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649728223782816766 09/25/22-10:39:14.776089
          SID:2816766
          Source Port:49728
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649741223782816766 09/25/22-10:39:54.862352
          SID:2816766
          Source Port:49741
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649723223782816718 09/25/22-10:39:07.608396
          SID:2816718
          Source Port:49723
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649733223782025019 09/25/22-10:39:40.736255
          SID:2025019
          Source Port:49733
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649709223782816766 09/25/22-10:38:06.120867
          SID:2816766
          Source Port:49709
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3167.71.56.11649741223782025019 09/25/22-10:39:53.012867
          SID:2025019
          Source Port:49741
          Destination Port:22378
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: SdwkQEBnc3.exeReversingLabs: Detection: 100%
          Source: SdwkQEBnc3.exeVirustotal: Detection: 83%Perma Link
          Source: SdwkQEBnc3.exeMetadefender: Detection: 94%Perma Link
          Source: SdwkQEBnc3.exeAvira: detected
          Source: eu-central-7075.packetriot.netAvira URL Cloud: Label: malware
          Source: eu-central-7075.packetriot.netVirustotal: Detection: 10%Perma Link
          Source: eu-central-7075.packetriot.netVirustotal: Detection: 10%Perma Link
          Source: Yara matchFile source: SdwkQEBnc3.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.463e424.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.5e34629.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.4642a4d.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.5e30000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.46395ee.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.5e30000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.463e424.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SdwkQEBnc3.exe PID: 5128, type: MEMORYSTR
          Source: SdwkQEBnc3.exeJoe Sandbox ML: detected
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 0.2.SdwkQEBnc3.exe.5e30000.6.unpackAvira: Label: TR/NanoCore.fadte
          Source: 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "7fd0fb12-397b-455a-940b-bef9261b", "Group": "kurban", "Domain1": "eu-central-7075.packetriot.net", "Domain2": "127.0.0.1", "Port": 22378, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
          Source: SdwkQEBnc3.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll

          Networking

          barindex
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49708 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49708 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.3:49708 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49709 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49709 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49712 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49712 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49716 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49716 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49717 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49717 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49719 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49719 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49723 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49723 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.3:49723 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49728 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49728 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49729 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49729 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49733 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49733 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49737 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49737 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49741 -> 167.71.56.116:22378
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49741 -> 167.71.56.116:22378
          Source: Malware configuration extractorURLs: eu-central-7075.packetriot.net
          Source: Malware configuration extractorURLs: 127.0.0.1
          Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
          Source: Joe Sandbox ViewIP Address: 167.71.56.116 167.71.56.116
          Source: global trafficTCP traffic: 192.168.2.3:49708 -> 167.71.56.116:22378
          Source: unknownDNS traffic detected: queries for: eu-central-7075.packetriot.net
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_05832CD2 WSARecv,
          Source: SdwkQEBnc3.exe, 00000000.00000002.506539476.00000000015AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
          Source: SdwkQEBnc3.exe, 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: SdwkQEBnc3.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.463e424.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.5e34629.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.4642a4d.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.5e30000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.46395ee.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.5e30000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.463e424.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SdwkQEBnc3.exe PID: 5128, type: MEMORYSTR

          System Summary

          barindex
          Source: SdwkQEBnc3.exe, type: SAMPLEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: SdwkQEBnc3.exe, type: SAMPLEMatched rule: Detects NanoCore Author: ditekSHen
          Source: SdwkQEBnc3.exe, type: SAMPLEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: SdwkQEBnc3.exe, type: SAMPLEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.SdwkQEBnc3.exe.463e424.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.SdwkQEBnc3.exe.463e424.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.SdwkQEBnc3.exe.463e424.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.SdwkQEBnc3.exe.5a80000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.SdwkQEBnc3.exe.5a80000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.SdwkQEBnc3.exe.5a80000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.SdwkQEBnc3.exe.5e34629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.SdwkQEBnc3.exe.5e34629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.SdwkQEBnc3.exe.5e34629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.SdwkQEBnc3.exe.4642a4d.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.SdwkQEBnc3.exe.4642a4d.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.SdwkQEBnc3.exe.4642a4d.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.SdwkQEBnc3.exe.5e30000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.SdwkQEBnc3.exe.5e30000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.SdwkQEBnc3.exe.5e30000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.SdwkQEBnc3.exe.46395ee.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.SdwkQEBnc3.exe.46395ee.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.SdwkQEBnc3.exe.46395ee.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.SdwkQEBnc3.exe.46395ee.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.SdwkQEBnc3.exe.5e30000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.SdwkQEBnc3.exe.5e30000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.SdwkQEBnc3.exe.5e30000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.SdwkQEBnc3.exe.463e424.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.SdwkQEBnc3.exe.463e424.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.SdwkQEBnc3.exe.463e424.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.SdwkQEBnc3.exe.3601784.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.SdwkQEBnc3.exe.3601784.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.SdwkQEBnc3.exe.3601784.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000000.00000002.513184324.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.513184324.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000000.00000002.513184324.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000000.00000002.508672696.00000000035F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: Process Memory Space: SdwkQEBnc3.exe PID: 5128, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: SdwkQEBnc3.exe PID: 5128, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: SdwkQEBnc3.exe PID: 5128, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: SdwkQEBnc3.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: SdwkQEBnc3.exe, type: SAMPLEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: SdwkQEBnc3.exe, type: SAMPLEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: SdwkQEBnc3.exe, type: SAMPLEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: SdwkQEBnc3.exe, type: SAMPLEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: SdwkQEBnc3.exe, type: SAMPLEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.SdwkQEBnc3.exe.463e424.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.463e424.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.463e424.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.SdwkQEBnc3.exe.463e424.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.SdwkQEBnc3.exe.5a80000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.5a80000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.5a80000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.SdwkQEBnc3.exe.5a80000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.SdwkQEBnc3.exe.5e34629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.5e34629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.5e34629.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.SdwkQEBnc3.exe.5e34629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.SdwkQEBnc3.exe.4642a4d.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.4642a4d.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.4642a4d.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.SdwkQEBnc3.exe.4642a4d.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.SdwkQEBnc3.exe.5e30000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.5e30000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.5e30000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.SdwkQEBnc3.exe.5e30000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.SdwkQEBnc3.exe.46395ee.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.46395ee.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.46395ee.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.SdwkQEBnc3.exe.46395ee.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.SdwkQEBnc3.exe.46395ee.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.SdwkQEBnc3.exe.5e30000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.5e30000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.5e30000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.SdwkQEBnc3.exe.5e30000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.SdwkQEBnc3.exe.463e424.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.463e424.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.463e424.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.SdwkQEBnc3.exe.463e424.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.SdwkQEBnc3.exe.3601784.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.3601784.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.SdwkQEBnc3.exe.3601784.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.SdwkQEBnc3.exe.3601784.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000000.00000002.513184324.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000000.00000002.513184324.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000000.00000002.513184324.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000000.00000002.513184324.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000000.00000002.508672696.00000000035F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: Process Memory Space: SdwkQEBnc3.exe PID: 5128, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: Process Memory Space: SdwkQEBnc3.exe PID: 5128, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: SdwkQEBnc3.exe PID: 5128, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_0570AD38
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_05708468
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_05709068
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_057023A0
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_05702FA8
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_0570912F
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_05709910
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_0570306F
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_0570937B
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_05831642 NtQuerySystemInformation,
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_05831607 NtQuerySystemInformation,
          Source: SdwkQEBnc3.exe, 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs SdwkQEBnc3.exe
          Source: SdwkQEBnc3.exe, 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs SdwkQEBnc3.exe
          Source: SdwkQEBnc3.exe, 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs SdwkQEBnc3.exe
          Source: SdwkQEBnc3.exe, 00000000.00000002.513932324.00000000061D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs SdwkQEBnc3.exe
          Source: SdwkQEBnc3.exe, 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs SdwkQEBnc3.exe
          Source: SdwkQEBnc3.exe, 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs SdwkQEBnc3.exe
          Source: SdwkQEBnc3.exe, 00000000.00000002.508672696.00000000035F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs SdwkQEBnc3.exe
          Source: SdwkQEBnc3.exe, 00000000.00000002.513184324.0000000005A80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs SdwkQEBnc3.exe
          Source: SdwkQEBnc3.exe, 00000000.00000002.506539476.00000000015AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs SdwkQEBnc3.exe
          Source: SdwkQEBnc3.exeStatic PE information: Section: .rsrc ZLIB complexity 0.9997098214285715
          Source: SdwkQEBnc3.exeReversingLabs: Detection: 100%
          Source: SdwkQEBnc3.exeVirustotal: Detection: 83%
          Source: SdwkQEBnc3.exeMetadefender: Detection: 94%
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeFile read: C:\Users\user\Desktop\SdwkQEBnc3.exeJump to behavior
          Source: SdwkQEBnc3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_05831402 AdjustTokenPrivileges,
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_058313CB AdjustTokenPrivileges,
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeFile created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9AJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@1/1@12/3
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: SdwkQEBnc3.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: SdwkQEBnc3.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: SdwkQEBnc3.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{7fd0fb12-397b-455a-940b-bef9261bdda7}
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: SdwkQEBnc3.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: SdwkQEBnc3.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: SdwkQEBnc3.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
          Source: SdwkQEBnc3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR

          Data Obfuscation

          barindex
          Source: SdwkQEBnc3.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: SdwkQEBnc3.exe, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: SdwkQEBnc3.exe, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: SdwkQEBnc3.exe, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeFile opened: C:\Users\user\Desktop\SdwkQEBnc3.exe:Zone.Identifier read attributes | delete
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exe TID: 5140Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exe TID: 5156Thread sleep time: -280000s >= -30000s
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeWindow / User API: threadDelayed 397
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeWindow / User API: foregroundWindowGot 1237
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_0583112A GetSystemInfo,
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeThread delayed: delay time: 922337203685477
          Source: SdwkQEBnc3.exe, 00000000.00000003.252232280.0000000001671000.00000004.00000020.00020000.00000000.sdmp, SdwkQEBnc3.exe, 00000000.00000003.404164699.0000000001671000.00000004.00000020.00020000.00000000.sdmp, SdwkQEBnc3.exe, 00000000.00000003.251082376.0000000001671000.00000004.00000020.00020000.00000000.sdmp, SdwkQEBnc3.exe, 00000000.00000003.463806944.0000000001671000.00000004.00000020.00020000.00000000.sdmp, SdwkQEBnc3.exe, 00000000.00000003.479435315.0000000001671000.00000004.00000020.00020000.00000000.sdmp, SdwkQEBnc3.exe, 00000000.00000003.245467170.0000000001671000.00000004.00000020.00020000.00000000.sdmp, SdwkQEBnc3.exe, 00000000.00000003.251568865.0000000001671000.00000004.00000020.00020000.00000000.sdmp, SdwkQEBnc3.exe, 00000000.00000003.256553111.0000000001671000.00000004.00000020.00020000.00000000.sdmp, SdwkQEBnc3.exe, 00000000.00000003.254004502.0000000001671000.00000004.00000020.00020000.00000000.sdmp, SdwkQEBnc3.exe, 00000000.00000003.245695919.0000000001671000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll<
          Source: SdwkQEBnc3.exe, 00000000.00000003.243210520.000000000166A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeMemory allocated: page read and write | page guard
          Source: SdwkQEBnc3.exe, 00000000.00000003.463798700.000000000166B000.00000004.00000020.00020000.00000000.sdmp, SdwkQEBnc3.exe, 00000000.00000003.419327218.0000000001667000.00000004.00000020.00020000.00000000.sdmp, SdwkQEBnc3.exe, 00000000.00000003.475818393.000000000166A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerh
          Source: SdwkQEBnc3.exe, 00000000.00000002.511063942.0000000003818000.00000004.00000800.00020000.00000000.sdmp, SdwkQEBnc3.exe, 00000000.00000002.511340676.0000000003868000.00000004.00000800.00020000.00000000.sdmp, SdwkQEBnc3.exe, 00000000.00000002.510520358.0000000003762000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: SdwkQEBnc3.exe, 00000000.00000002.509324331.000000000367C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerp
          Source: SdwkQEBnc3.exe, 00000000.00000002.510520358.0000000003762000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager`
          Source: SdwkQEBnc3.exe, 00000000.00000002.507614889.0000000001615000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: SdwkQEBnc3.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.463e424.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.5e34629.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.4642a4d.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.5e30000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.46395ee.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.5e30000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.463e424.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SdwkQEBnc3.exe PID: 5128, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: SdwkQEBnc3.exe, 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: SdwkQEBnc3.exe, 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: SdwkQEBnc3.exe, 00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: SdwkQEBnc3.exe, 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: SdwkQEBnc3.exe, 00000000.00000002.508672696.00000000035F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: SdwkQEBnc3.exe, 00000000.00000002.508672696.00000000035F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: SdwkQEBnc3.exe, 00000000.00000002.513184324.0000000005A80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: SdwkQEBnc3.exe, 00000000.00000002.513184324.0000000005A80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: SdwkQEBnc3.exeString found in binary or memory: NanoCore.ClientPluginHost
          Source: Yara matchFile source: SdwkQEBnc3.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.463e424.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.5e34629.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.SdwkQEBnc3.exe.f10000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.4642a4d.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.5e30000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.46395ee.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.5e30000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SdwkQEBnc3.exe.463e424.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SdwkQEBnc3.exe PID: 5128, type: MEMORYSTR
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_05832816 bind,
          Source: C:\Users\user\Desktop\SdwkQEBnc3.exeCode function: 0_2_058327C4 bind,
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationPath Interception1
          Access Token Manipulation
          1
          Masquerading
          21
          Input Capture
          1
          Security Software Discovery
          Remote Services21
          Input Capture
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          Process Injection
          1
          Disable or Modify Tools
          LSASS Memory2
          Process Discovery
          Remote Desktop Protocol11
          Archive Collected Data
          Exfiltration Over Bluetooth1
          Non-Standard Port
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
          Virtualization/Sandbox Evasion
          Security Account Manager21
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
          Remote Access Software
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
          Access Token Manipulation
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer1
          Ingress Tool Transfer
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Process Injection
          LSA Secrets3
          System Information Discovery
          SSHKeyloggingData Transfer Size Limits1
          Non-Application Layer Protocol
          Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          Deobfuscate/Decode Files or Information
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 Channel11
          Application Layer Protocol
          Jamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items1
          Hidden Files and Directories
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
          Software Packing
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          SdwkQEBnc3.exe100%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
          SdwkQEBnc3.exe83%VirustotalBrowse
          SdwkQEBnc3.exe94%MetadefenderBrowse
          SdwkQEBnc3.exe100%AviraTR/Dropper.MSIL.Gen7
          SdwkQEBnc3.exe100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          0.0.SdwkQEBnc3.exe.f10000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          0.2.SdwkQEBnc3.exe.5e30000.6.unpack100%AviraTR/NanoCore.fadteDownload File
          SourceDetectionScannerLabelLink
          eu-central-7075.packetriot.net10%VirustotalBrowse
          SourceDetectionScannerLabelLink
          eu-central-7075.packetriot.net10%VirustotalBrowse
          127.0.0.11%VirustotalBrowse
          127.0.0.10%Avira URL Cloudsafe
          eu-central-7075.packetriot.net100%Avira URL Cloudmalware
          NameIPActiveMaliciousAntivirus DetectionReputation
          eu-central-7075.packetriot.net
          167.71.56.116
          truetrueunknown
          NameMaliciousAntivirus DetectionReputation
          eu-central-7075.packetriot.nettrue
          • 10%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          127.0.0.1true
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          167.71.56.116
          eu-central-7075.packetriot.netUnited States
          14061DIGITALOCEAN-ASNUStrue
          IP
          192.168.2.1
          127.0.0.1
          Joe Sandbox Version:36.0.0 Rainbow Opal
          Analysis ID:709347
          Start date and time:2022-09-25 10:37:05 +02:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 5m 37s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:SdwkQEBnc3.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:20
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@1/1@12/3
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
          • TCP Packets have been reduced to 100
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, login.live.com, ctldl.windowsupdate.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          TimeTypeDescription
          10:37:58API Interceptor1016x Sleep call for process: SdwkQEBnc3.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\SdwkQEBnc3.exe
          File Type:data
          Category:dropped
          Size (bytes):8
          Entropy (8bit):3.0
          Encrypted:false
          SSDEEP:3:Uk/tn:Ukl
          MD5:2AC74D46D23C202B8D77F932CE807595
          SHA1:E9FAFC5726FBF9B21A51370F5CB9ED07481F6C39
          SHA-256:982CB56995CCC98B0B3117C4123E053DC19903F3D41F9F3E5C036629B809E046
          SHA-512:A25513343E660EB82278A36E1B96DEA9A334F16D62D79E165EE1A9AEB49CE3AD594460161A0EEE6FD33AE5D2A94C63D758C342F421231D1669A2B5534C035627
          Malicious:true
          Reputation:low
          Preview:..j....H
          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):7.448162265044309
          TrID:
          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          • Win32 Executable (generic) a (10002005/4) 49.78%
          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
          • Generic Win/DOS Executable (2004/3) 0.01%
          • DOS Executable Generic (2002/1) 0.01%
          File name:SdwkQEBnc3.exe
          File size:207360
          MD5:33851c19216f0e65db0aecc27dc71ffc
          SHA1:0ad881c7d507bea247bfe454e29bc645f3d1b4ac
          SHA256:d3c3718f2106aca6ed10bb92ec37e99bcadd8536f499af4de3849625a0a1c109
          SHA512:beb70bc68603bc8722656297c7bab35fd15ba7a2d91520f22ea00b2d021ee171c38917d0ddd0bb50e752294c20bd2a257da7623c464252cde4f490c5b66af708
          SSDEEP:6144:gLV6Bta6dtJmakIM5XQa2WCE085Qe6nGH:gLV6Btpmk22Wd085GnC
          TLSH:6C14CF5677A94A2FE1DE89B9711241038378C2E7A8D3F3EF28D425B69F267E006471D3
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................`........... ........@.. .....................................................................
          Icon Hash:00828e8e8686b000
          Entrypoint:0x41e792
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          DLL Characteristics:
          Time Stamp:0x54E927A1 [Sun Feb 22 00:49:37 2015 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
          Instruction
          jmp dword ptr [00402000h]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x1e7380x57.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x15d90.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x200000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000x1c7980x1c800False0.594495271381579data6.598046369910041IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .reloc0x200000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          .rsrc0x220000x15d900x15e00False0.9997098214285715data7.997673261620719IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          RT_RCDATA0x220580x15d38TIM image, (2595,61413)
          DLLImport
          mscoree.dll_CorExeMain
          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
          192.168.2.3167.71.56.11649729223782025019 09/25/22-10:39:19.021240TCP2025019ET TROJAN Possible NanoCore C2 60B4972922378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649708223782025019 09/25/22-10:37:58.335400TCP2025019ET TROJAN Possible NanoCore C2 60B4970822378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649719223782025019 09/25/22-10:38:45.572488TCP2025019ET TROJAN Possible NanoCore C2 60B4971922378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649728223782025019 09/25/22-10:39:13.005416TCP2025019ET TROJAN Possible NanoCore C2 60B4972822378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649723223782025019 09/25/22-10:39:06.622577TCP2025019ET TROJAN Possible NanoCore C2 60B4972322378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649709223782025019 09/25/22-10:38:04.391752TCP2025019ET TROJAN Possible NanoCore C2 60B4970922378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649712223782025019 09/25/22-10:38:11.114012TCP2025019ET TROJAN Possible NanoCore C2 60B4971222378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649723223782816766 09/25/22-10:39:08.421800TCP2816766ETPRO TROJAN NanoCore RAT CnC 74972322378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649733223782816766 09/25/22-10:39:42.564776TCP2816766ETPRO TROJAN NanoCore RAT CnC 74973322378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649712223782816766 09/25/22-10:38:14.198704TCP2816766ETPRO TROJAN NanoCore RAT CnC 74971222378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649737223782025019 09/25/22-10:39:46.930085TCP2025019ET TROJAN Possible NanoCore C2 60B4973722378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649716223782025019 09/25/22-10:38:33.571963TCP2025019ET TROJAN Possible NanoCore C2 60B4971622378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649717223782025019 09/25/22-10:38:39.534899TCP2025019ET TROJAN Possible NanoCore C2 60B4971722378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649708223782816718 09/25/22-10:37:59.384612TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon4970822378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649716223782816766 09/25/22-10:38:35.293304TCP2816766ETPRO TROJAN NanoCore RAT CnC 74971622378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649737223782816766 09/25/22-10:39:48.190268TCP2816766ETPRO TROJAN NanoCore RAT CnC 74973722378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649729223782816766 09/25/22-10:39:20.875554TCP2816766ETPRO TROJAN NanoCore RAT CnC 74972922378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649719223782816766 09/25/22-10:38:47.309965TCP2816766ETPRO TROJAN NanoCore RAT CnC 74971922378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649708223782816766 09/25/22-10:38:00.056144TCP2816766ETPRO TROJAN NanoCore RAT CnC 74970822378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649717223782816766 09/25/22-10:38:41.356311TCP2816766ETPRO TROJAN NanoCore RAT CnC 74971722378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649728223782816766 09/25/22-10:39:14.776089TCP2816766ETPRO TROJAN NanoCore RAT CnC 74972822378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649741223782816766 09/25/22-10:39:54.862352TCP2816766ETPRO TROJAN NanoCore RAT CnC 74974122378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649723223782816718 09/25/22-10:39:07.608396TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon4972322378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649733223782025019 09/25/22-10:39:40.736255TCP2025019ET TROJAN Possible NanoCore C2 60B4973322378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649709223782816766 09/25/22-10:38:06.120867TCP2816766ETPRO TROJAN NanoCore RAT CnC 74970922378192.168.2.3167.71.56.116
          192.168.2.3167.71.56.11649741223782025019 09/25/22-10:39:53.012867TCP2025019ET TROJAN Possible NanoCore C2 60B4974122378192.168.2.3167.71.56.116
          TimestampSource PortDest PortSource IPDest IP
          Sep 25, 2022 10:37:58.264648914 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:58.296509027 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:37:58.296634912 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:58.335400105 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:58.366008043 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:37:58.415612936 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:58.446237087 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:37:58.477843046 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:58.508677006 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:37:58.603470087 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:58.635688066 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:37:58.673021078 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:58.703991890 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:37:58.822587967 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:58.855446100 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:37:58.883898973 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:58.914707899 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:37:59.009452105 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:59.040250063 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:37:59.103066921 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:59.133682966 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:37:59.320054054 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:59.350832939 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:37:59.384612083 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:59.415494919 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:37:59.468890905 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:59.499579906 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:37:59.649624109 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:59.680293083 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:37:59.712111950 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:59.742652893 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:37:59.864775896 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:59.895387888 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:37:59.931041002 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:37:59.961791039 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:00.056143999 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:00.127749920 CEST2237849708167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:00.182921886 CEST4970822378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:04.354166031 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:04.384440899 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:04.384546041 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:04.391752005 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:04.421927929 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:04.447284937 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:04.477539062 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:04.541570902 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:04.572074890 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:04.681499958 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:04.711612940 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:04.806596994 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:04.837306976 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:04.887413025 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:04.922811031 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:05.010030031 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:05.040236950 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:05.088083982 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:05.118360996 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:05.213840961 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:05.244219065 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:05.353310108 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:05.385812998 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:05.432198048 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:05.464849949 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:05.562103987 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:05.594657898 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:05.689172983 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:05.722748995 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:05.744601965 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:05.777255058 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:05.853795052 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:05.884052038 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:06.009485006 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:06.039866924 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:06.120867014 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:06.190546989 CEST2237849709167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:06.259795904 CEST4970922378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:10.947829008 CEST4971222378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:10.978771925 CEST2237849712167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:10.978933096 CEST4971222378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:11.114012003 CEST4971222378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:11.146862030 CEST2237849712167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:11.723541021 CEST4971222378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:11.754926920 CEST2237849712167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:11.792958021 CEST4971222378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:11.823889971 CEST2237849712167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:11.902371883 CEST4971222378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:11.934346914 CEST2237849712167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:11.994277000 CEST4971222378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:12.025028944 CEST2237849712167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:12.209912062 CEST4971222378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:12.243458033 CEST2237849712167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:12.278104067 CEST4971222378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:12.310245037 CEST2237849712167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:13.070338964 CEST4971222378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:13.101237059 CEST2237849712167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:13.263070107 CEST4971222378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:13.293661118 CEST2237849712167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:13.369754076 CEST4971222378192.168.2.3167.71.56.116
          Sep 25, 2022 10:38:13.400302887 CEST2237849712167.71.56.116192.168.2.3
          Sep 25, 2022 10:38:13.526094913 CEST4971222378192.168.2.3167.71.56.116
          TimestampSource PortDest PortSource IPDest IP
          Sep 25, 2022 10:37:58.214035988 CEST5799053192.168.2.38.8.8.8
          Sep 25, 2022 10:37:58.251596928 CEST53579908.8.8.8192.168.2.3
          Sep 25, 2022 10:38:04.242063046 CEST5238753192.168.2.38.8.8.8
          Sep 25, 2022 10:38:04.352637053 CEST53523878.8.8.8192.168.2.3
          Sep 25, 2022 10:38:10.737216949 CEST6062553192.168.2.38.8.8.8
          Sep 25, 2022 10:38:10.921155930 CEST53606258.8.8.8192.168.2.3
          Sep 25, 2022 10:38:33.491652012 CEST4930253192.168.2.38.8.8.8
          Sep 25, 2022 10:38:33.538759947 CEST53493028.8.8.8192.168.2.3
          Sep 25, 2022 10:38:39.458796024 CEST5397553192.168.2.38.8.8.8
          Sep 25, 2022 10:38:39.499471903 CEST53539758.8.8.8192.168.2.3
          Sep 25, 2022 10:38:45.512289047 CEST5295553192.168.2.38.8.8.8
          Sep 25, 2022 10:38:45.532057047 CEST53529558.8.8.8192.168.2.3
          Sep 25, 2022 10:39:06.505239964 CEST6058253192.168.2.38.8.8.8
          Sep 25, 2022 10:39:06.525190115 CEST53605828.8.8.8192.168.2.3
          Sep 25, 2022 10:39:12.865638971 CEST5604253192.168.2.38.8.8.8
          Sep 25, 2022 10:39:12.972980976 CEST53560428.8.8.8192.168.2.3
          Sep 25, 2022 10:39:18.866290092 CEST5963653192.168.2.38.8.8.8
          Sep 25, 2022 10:39:18.976288080 CEST53596368.8.8.8192.168.2.3
          Sep 25, 2022 10:39:40.596112967 CEST5563853192.168.2.38.8.8.8
          Sep 25, 2022 10:39:40.703140020 CEST53556388.8.8.8192.168.2.3
          Sep 25, 2022 10:39:46.845093966 CEST6532053192.168.2.38.8.8.8
          Sep 25, 2022 10:39:46.883793116 CEST53653208.8.8.8192.168.2.3
          Sep 25, 2022 10:39:52.788522005 CEST6076753192.168.2.38.8.8.8
          Sep 25, 2022 10:39:52.979732990 CEST53607678.8.8.8192.168.2.3
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Sep 25, 2022 10:37:58.214035988 CEST192.168.2.38.8.8.80x3869Standard query (0)eu-central-7075.packetriot.netA (IP address)IN (0x0001)false
          Sep 25, 2022 10:38:04.242063046 CEST192.168.2.38.8.8.80xd439Standard query (0)eu-central-7075.packetriot.netA (IP address)IN (0x0001)false
          Sep 25, 2022 10:38:10.737216949 CEST192.168.2.38.8.8.80xce18Standard query (0)eu-central-7075.packetriot.netA (IP address)IN (0x0001)false
          Sep 25, 2022 10:38:33.491652012 CEST192.168.2.38.8.8.80xafc3Standard query (0)eu-central-7075.packetriot.netA (IP address)IN (0x0001)false
          Sep 25, 2022 10:38:39.458796024 CEST192.168.2.38.8.8.80xd21dStandard query (0)eu-central-7075.packetriot.netA (IP address)IN (0x0001)false
          Sep 25, 2022 10:38:45.512289047 CEST192.168.2.38.8.8.80xce32Standard query (0)eu-central-7075.packetriot.netA (IP address)IN (0x0001)false
          Sep 25, 2022 10:39:06.505239964 CEST192.168.2.38.8.8.80xe731Standard query (0)eu-central-7075.packetriot.netA (IP address)IN (0x0001)false
          Sep 25, 2022 10:39:12.865638971 CEST192.168.2.38.8.8.80x17beStandard query (0)eu-central-7075.packetriot.netA (IP address)IN (0x0001)false
          Sep 25, 2022 10:39:18.866290092 CEST192.168.2.38.8.8.80x8e54Standard query (0)eu-central-7075.packetriot.netA (IP address)IN (0x0001)false
          Sep 25, 2022 10:39:40.596112967 CEST192.168.2.38.8.8.80xffc4Standard query (0)eu-central-7075.packetriot.netA (IP address)IN (0x0001)false
          Sep 25, 2022 10:39:46.845093966 CEST192.168.2.38.8.8.80x1802Standard query (0)eu-central-7075.packetriot.netA (IP address)IN (0x0001)false
          Sep 25, 2022 10:39:52.788522005 CEST192.168.2.38.8.8.80xb812Standard query (0)eu-central-7075.packetriot.netA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Sep 25, 2022 10:37:58.251596928 CEST8.8.8.8192.168.2.30x3869No error (0)eu-central-7075.packetriot.net167.71.56.116A (IP address)IN (0x0001)false
          Sep 25, 2022 10:38:04.352637053 CEST8.8.8.8192.168.2.30xd439No error (0)eu-central-7075.packetriot.net167.71.56.116A (IP address)IN (0x0001)false
          Sep 25, 2022 10:38:10.921155930 CEST8.8.8.8192.168.2.30xce18No error (0)eu-central-7075.packetriot.net167.71.56.116A (IP address)IN (0x0001)false
          Sep 25, 2022 10:38:33.538759947 CEST8.8.8.8192.168.2.30xafc3No error (0)eu-central-7075.packetriot.net167.71.56.116A (IP address)IN (0x0001)false
          Sep 25, 2022 10:38:39.499471903 CEST8.8.8.8192.168.2.30xd21dNo error (0)eu-central-7075.packetriot.net167.71.56.116A (IP address)IN (0x0001)false
          Sep 25, 2022 10:38:45.532057047 CEST8.8.8.8192.168.2.30xce32No error (0)eu-central-7075.packetriot.net167.71.56.116A (IP address)IN (0x0001)false
          Sep 25, 2022 10:39:06.525190115 CEST8.8.8.8192.168.2.30xe731No error (0)eu-central-7075.packetriot.net167.71.56.116A (IP address)IN (0x0001)false
          Sep 25, 2022 10:39:12.972980976 CEST8.8.8.8192.168.2.30x17beNo error (0)eu-central-7075.packetriot.net167.71.56.116A (IP address)IN (0x0001)false
          Sep 25, 2022 10:39:18.976288080 CEST8.8.8.8192.168.2.30x8e54No error (0)eu-central-7075.packetriot.net167.71.56.116A (IP address)IN (0x0001)false
          Sep 25, 2022 10:39:40.703140020 CEST8.8.8.8192.168.2.30xffc4No error (0)eu-central-7075.packetriot.net167.71.56.116A (IP address)IN (0x0001)false
          Sep 25, 2022 10:39:46.883793116 CEST8.8.8.8192.168.2.30x1802No error (0)eu-central-7075.packetriot.net167.71.56.116A (IP address)IN (0x0001)false
          Sep 25, 2022 10:39:52.979732990 CEST8.8.8.8192.168.2.30xb812No error (0)eu-central-7075.packetriot.net167.71.56.116A (IP address)IN (0x0001)false
          No statistics
          Target ID:0
          Start time:10:37:56
          Start date:25/09/2022
          Path:C:\Users\user\Desktop\SdwkQEBnc3.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\SdwkQEBnc3.exe"
          Imagebase:0xf10000
          File size:207360 bytes
          MD5 hash:33851C19216F0E65DB0AECC27DC71FFC
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000000.239926624.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.511555903.0000000004637000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.513466163.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.513184324.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.513184324.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000000.00000002.513184324.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.513184324.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.508672696.00000000035F1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          Reputation:low

          No disassembly