Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
confirm order.exe

Overview

General Information

Sample Name:confirm order.exe
Analysis ID:712188
MD5:e5e6a926238dfecd931967194ff92bf4
SHA1:b233228269367904bb0ee23b0b47fabf50ba5df2
SHA256:219eeb73337cb0cb6b1e4af6093af3c0f4bef72af443be61adf1b2dc7eaf9063
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Initial sample is a PE file and has a suspicious name
Connects to many ports of the same IP (likely port scanning)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Encrypted powershell cmdline option found
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • confirm order.exe (PID: 5552 cmdline: "C:\Users\user\Desktop\confirm order.exe" MD5: E5E6A926238DFECD931967194FF92BF4)
    • powershell.exe (PID: 1756 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA== MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 1652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • confirm order.exe (PID: 1020 cmdline: C:\Users\user\Desktop\confirm order.exe MD5: E5E6A926238DFECD931967194FF92BF4)
  • Ugtphvhf.exe (PID: 5292 cmdline: "C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe" MD5: E5E6A926238DFECD931967194FF92BF4)
    • powershell.exe (PID: 5344 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA== MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 2384 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • Ugtphvhf.exe (PID: 6072 cmdline: "C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe" MD5: E5E6A926238DFECD931967194FF92BF4)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "6a8dc68c-2ae6-4a66-b5dc-80cfa679", "Group": "jop", "Domain1": "146.70.76.43", "Domain2": "", "Port": 56281, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 9, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.447081649.00000000031D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.447887037.00000000032BD000.00000004.00000800.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x3c9d9:$x1: NanoCore.ClientPluginHost
    • 0x3ca16:$x2: IClientNetworkHost
    • 0x40549:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000000.00000002.447887037.00000000032BD000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x3c741:$a: NanoCore
    • 0x3c751:$a: NanoCore
    • 0x3c985:$a: NanoCore
    • 0x3c999:$a: NanoCore
    • 0x3c9d9:$a: NanoCore
    • 0x3c7a0:$b: ClientPlugin
    • 0x3c9a2:$b: ClientPlugin
    • 0x3c9e2:$b: ClientPlugin
    • 0x3c8c7:$c: ProjectData
    • 0x3d2ce:$d: DESCrypto
    • 0x3ee83:$i: get_Connected
    • 0x3d604:$j: #=q
    • 0x3d634:$j: #=q
    • 0x3d650:$j: #=q
    • 0x3d680:$j: #=q
    • 0x3d69c:$j: #=q
    • 0x3d6b8:$j: #=q
    • 0x3d6e8:$j: #=q
    • 0x3d704:$j: #=q
    • 0x3d748:$j: #=q
    • 0x3d764:$j: #=q
    00000000.00000002.447887037.00000000032BD000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x3c9d9:$a1: NanoCore.ClientPluginHost
    • 0x3c999:$a2: NanoCore.ClientPlugin
    • 0x3e8f2:$b1: get_BuilderSettings
    • 0x3c7f5:$b2: ClientLoaderForm.resources
    • 0x3e012:$b3: PluginCommand
    • 0x3c9ca:$b4: IClientAppHost
    • 0x3ef4a:$b6: AddHostEntry
    • 0x3eeb7:$b8: PipeExists
    • 0x3ca03:$b9: IClientLoggingHost
    00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x106ad:$x1: NanoCore.ClientPluginHost
    • 0x42ecd:$x1: NanoCore.ClientPluginHost
    • 0x106ea:$x2: IClientNetworkHost
    • 0x42f0a:$x2: IClientNetworkHost
    • 0x1421d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x46a3d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    Click to see the 49 entries
    SourceRuleDescriptionAuthorStrings
    14.2.confirm order.exe.6010000.6.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xf7ad:$x1: NanoCore.ClientPluginHost
    • 0xf7da:$x2: IClientNetworkHost
    14.2.confirm order.exe.6010000.6.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xf7ad:$x2: NanoCore.ClientPluginHost
    • 0x10888:$s4: PipeCreated
    • 0xf7c7:$s5: IClientLoggingHost
    14.2.confirm order.exe.6010000.6.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      14.2.confirm order.exe.6010000.6.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xf778:$x2: NanoCore.ClientPlugin
      • 0xf7ad:$x3: NanoCore.ClientPluginHost
      • 0xf76c:$i2: IClientData
      • 0xf78e:$i3: IClientNetwork
      • 0xf79d:$i5: IClientDataHost
      • 0xf7c7:$i6: IClientLoggingHost
      • 0xf7da:$i7: IClientNetworkHost
      • 0xf7ed:$i8: IClientUIHost
      • 0xf7fb:$i9: IClientNameObjectCollection
      • 0xf817:$i10: IClientReadOnlyNameObjectCollection
      • 0xf56a:$s1: ClientPlugin
      • 0xf781:$s1: ClientPlugin
      • 0x147a2:$s6: get_ClientSettings
      14.2.confirm order.exe.6010000.6.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
      • 0xf7ad:$a1: NanoCore.ClientPluginHost
      • 0xf778:$a2: NanoCore.ClientPlugin
      • 0x146f3:$b1: get_BuilderSettings
      • 0x14662:$b7: LogClientException
      • 0xf7c7:$b9: IClientLoggingHost
      Click to see the 98 entries

      AV Detection

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\confirm order.exe, ProcessId: 1020, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\confirm order.exe, ProcessId: 1020, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Stealing of Sensitive Information

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\confirm order.exe, ProcessId: 1020, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\confirm order.exe, ProcessId: 1020, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: confirm order.exeReversingLabs: Detection: 40%
      Source: confirm order.exeVirustotal: Detection: 48%Perma Link
      Source: 146.70.76.43Avira URL Cloud: Label: malware
      Source: 146.70.76.43Virustotal: Detection: 6%Perma Link
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeReversingLabs: Detection: 40%
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeVirustotal: Detection: 48%Perma Link
      Source: Yara matchFile source: 14.2.confirm order.exe.6010000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.3f8ff3c.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.3f94565.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.0.confirm order.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.42d2500.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.42aa4e0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.6014629.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.6010000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.42d2500.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.42aa4e0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.4322520.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.3f8b106.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.3f8ff3c.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.4322520.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000000.444492363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.453904454.0000000004283000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.545716802.0000000003F72000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: confirm order.exe PID: 5552, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: confirm order.exe PID: 1020, type: MEMORYSTR
      Source: confirm order.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeJoe Sandbox ML: detected
      Source: 14.0.confirm order.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 14.2.confirm order.exe.6010000.6.unpackAvira: Label: TR/NanoCore.fadte
      Source: 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6a8dc68c-2ae6-4a66-b5dc-80cfa679", "Group": "jop", "Domain1": "146.70.76.43", "Domain2": "", "Port": 56281, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 9, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Source: confirm order.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: confirm order.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdb source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561422892.00000000040E6000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdbSHA256w^ source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561422892.00000000040E6000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp

      Networking

      barindex
      Source: global trafficTCP traffic: 146.70.76.43 ports 56281,1,2,5,6,8
      Source: Malware configuration extractorURLs:
      Source: Malware configuration extractorURLs: 146.70.76.43
      Source: Joe Sandbox ViewASN Name: TENET-1ZA TENET-1ZA
      Source: Joe Sandbox ViewIP Address: 146.70.76.43 146.70.76.43
      Source: global trafficTCP traffic: 192.168.2.3:49704 -> 146.70.76.43:56281
      Source: unknownTCP traffic detected without corresponding DNS query: 146.70.76.43
      Source: unknownTCP traffic detected without corresponding DNS query: 146.70.76.43
      Source: unknownTCP traffic detected without corresponding DNS query: 146.70.76.43
      Source: unknownTCP traffic detected without corresponding DNS query: 146.70.76.43
      Source: unknownTCP traffic detected without corresponding DNS query: 146.70.76.43
      Source: unknownTCP traffic detected without corresponding DNS query: 146.70.76.43
      Source: unknownTCP traffic detected without corresponding DNS query: 146.70.76.43
      Source: unknownTCP traffic detected without corresponding DNS query: 146.70.76.43
      Source: unknownTCP traffic detected without corresponding DNS query: 146.70.76.43
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.563157770.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.563162662.0000000004189000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561455007.00000000040E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.563157770.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.563162662.0000000004189000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561455007.00000000040E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.561450504.0000000003A88000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA.crt0
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.563157770.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.563162662.0000000004189000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561455007.00000000040E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.561450504.0000000003A88000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.561450504.0000000003A88000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA.crl0E
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.563157770.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.563162662.0000000004189000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561455007.00000000040E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.563157770.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.563162662.0000000004189000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561455007.00000000040E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.561450504.0000000003A88000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA.crl0L
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.563157770.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.563162662.0000000004189000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561455007.00000000040E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
      Source: Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.563075696.000000000417B000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561315549.00000000040DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://james.newtonking.com/projects/json
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.563157770.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.563162662.0000000004189000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561455007.00000000040E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.561450504.0000000003A88000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0K
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.561450504.0000000003A88000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0N
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.563157770.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.563162662.0000000004189000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561455007.00000000040E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
      Source: confirm order.exe, 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.563157770.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.563162662.0000000004189000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561455007.00000000040E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
      Source: confirm order.exe, 00000000.00000002.447081649.00000000031D1000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.448397158.0000000003358000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.532893471.00000000029C5000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.532813764.00000000029BC000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.537794657.0000000002AEB000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.532109090.0000000002981000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.537850084.000000000314B000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.532222883.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.532978281.0000000003025000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.532914557.000000000301C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.561450504.0000000003A88000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.563157770.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.563162662.0000000004189000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561455007.00000000040E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.563157770.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.563162662.0000000004189000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561455007.00000000040E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.newtonsoft.com/json
      Source: Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.newtonsoft.com/jsonschema
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561422892.00000000040E6000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.nuget.org/packages/Newtonsoft.Json.Bson
      Source: confirm order.exe, 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 14.2.confirm order.exe.6010000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.3f8ff3c.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.3f94565.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.0.confirm order.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.42d2500.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.42aa4e0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.6014629.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.6010000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.42d2500.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.42aa4e0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.4322520.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.3f8b106.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.3f8ff3c.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.4322520.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000000.444492363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.453904454.0000000004283000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.545716802.0000000003F72000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: confirm order.exe PID: 5552, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: confirm order.exe PID: 1020, type: MEMORYSTR

      System Summary

      barindex
      Source: 14.2.confirm order.exe.6010000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 14.2.confirm order.exe.6010000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.confirm order.exe.6010000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.confirm order.exe.3f8ff3c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 14.2.confirm order.exe.3f8ff3c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.confirm order.exe.3f8ff3c.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.confirm order.exe.3f94565.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 14.2.confirm order.exe.3f94565.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.confirm order.exe.3f94565.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.0.confirm order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 14.0.confirm order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.0.confirm order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 14.0.confirm order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.confirm order.exe.42d2500.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.confirm order.exe.42d2500.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.confirm order.exe.42d2500.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.confirm order.exe.42d2500.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.confirm order.exe.5830000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 14.2.confirm order.exe.5830000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.confirm order.exe.5830000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.confirm order.exe.42aa4e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.confirm order.exe.42aa4e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.confirm order.exe.42aa4e0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.confirm order.exe.42aa4e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.confirm order.exe.6014629.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 14.2.confirm order.exe.6014629.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.confirm order.exe.6014629.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.confirm order.exe.6010000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 14.2.confirm order.exe.6010000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.confirm order.exe.6010000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.confirm order.exe.42d2500.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.confirm order.exe.42d2500.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.confirm order.exe.42d2500.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.confirm order.exe.42d2500.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.confirm order.exe.2fa9578.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 14.2.confirm order.exe.2fa9578.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.confirm order.exe.2fa9578.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.confirm order.exe.42aa4e0.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.confirm order.exe.42aa4e0.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.confirm order.exe.42aa4e0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.confirm order.exe.42aa4e0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.confirm order.exe.4322520.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.confirm order.exe.4322520.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.confirm order.exe.4322520.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.confirm order.exe.4322520.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.confirm order.exe.32e984c.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.confirm order.exe.32e984c.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.confirm order.exe.32e984c.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.confirm order.exe.32e984c.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.confirm order.exe.32e984c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.confirm order.exe.32e984c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.confirm order.exe.32e984c.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.confirm order.exe.32e984c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.confirm order.exe.3f8b106.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 14.2.confirm order.exe.3f8b106.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.confirm order.exe.3f8b106.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 14.2.confirm order.exe.3f8b106.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.confirm order.exe.3f8ff3c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 14.2.confirm order.exe.3f8ff3c.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.confirm order.exe.3f8ff3c.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.confirm order.exe.4322520.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.confirm order.exe.4322520.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.confirm order.exe.4322520.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.confirm order.exe.4322520.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000000.00000002.447887037.00000000032BD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.447887037.00000000032BD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.447887037.00000000032BD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000E.00000000.444492363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000E.00000000.444492363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000E.00000000.444492363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000E.00000002.549837955.0000000005830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000E.00000002.549837955.0000000005830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000E.00000002.549837955.0000000005830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000000.00000002.453904454.0000000004283000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.453904454.0000000004283000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.453904454.0000000004283000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000E.00000002.545716802.0000000003F72000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000E.00000002.545716802.0000000003F72000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: confirm order.exe PID: 5552, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: confirm order.exe PID: 5552, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: confirm order.exe PID: 5552, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: confirm order.exe PID: 1020, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: confirm order.exe PID: 1020, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: confirm order.exe PID: 1020, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: initial sampleStatic PE information: Filename: confirm order.exe
      Source: confirm order.exe, WindowsFormsApp92/Tester.csLarge array initialization: GetBuffer: array initializer size 786944
      Source: Ugtphvhf.exe.0.dr, WindowsFormsApp92/Tester.csLarge array initialization: GetBuffer: array initializer size 786944
      Source: 0.0.confirm order.exe.dd0000.0.unpack, WindowsFormsApp92/Tester.csLarge array initialization: GetBuffer: array initializer size 786944
      Source: confirm order.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 14.2.confirm order.exe.6010000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.6010000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.6010000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.confirm order.exe.6010000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.confirm order.exe.3f8ff3c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.3f8ff3c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.3f8ff3c.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.confirm order.exe.3f8ff3c.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.confirm order.exe.3f94565.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.3f94565.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.3f94565.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.confirm order.exe.3f94565.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.0.confirm order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.0.confirm order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.0.confirm order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.0.confirm order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 14.0.confirm order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.confirm order.exe.42d2500.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.confirm order.exe.42d2500.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.confirm order.exe.42d2500.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.confirm order.exe.42d2500.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.confirm order.exe.42d2500.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.confirm order.exe.5830000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.5830000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.5830000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.confirm order.exe.5830000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.confirm order.exe.42aa4e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.confirm order.exe.42aa4e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.confirm order.exe.42aa4e0.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.confirm order.exe.42aa4e0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.confirm order.exe.42aa4e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.confirm order.exe.6014629.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.6014629.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.6014629.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.confirm order.exe.6014629.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.confirm order.exe.6010000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.6010000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.6010000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.confirm order.exe.6010000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.confirm order.exe.42d2500.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.confirm order.exe.42d2500.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.confirm order.exe.42d2500.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.confirm order.exe.42d2500.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.confirm order.exe.42d2500.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.confirm order.exe.2fa9578.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.2fa9578.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.2fa9578.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.confirm order.exe.2fa9578.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.confirm order.exe.42aa4e0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.confirm order.exe.42aa4e0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.confirm order.exe.42aa4e0.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.confirm order.exe.42aa4e0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.confirm order.exe.42aa4e0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.confirm order.exe.4322520.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.confirm order.exe.4322520.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.confirm order.exe.4322520.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.confirm order.exe.4322520.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.confirm order.exe.4322520.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.confirm order.exe.32e984c.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.confirm order.exe.32e984c.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.confirm order.exe.32e984c.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.confirm order.exe.32e984c.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.confirm order.exe.32e984c.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.confirm order.exe.32e984c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.confirm order.exe.32e984c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.confirm order.exe.32e984c.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.confirm order.exe.32e984c.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.confirm order.exe.32e984c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.confirm order.exe.3f8b106.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.3f8b106.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.3f8b106.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.confirm order.exe.3f8b106.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 14.2.confirm order.exe.3f8b106.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.confirm order.exe.3f8ff3c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.3f8ff3c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.confirm order.exe.3f8ff3c.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.confirm order.exe.3f8ff3c.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.confirm order.exe.4322520.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.confirm order.exe.4322520.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.confirm order.exe.4322520.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.confirm order.exe.4322520.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.confirm order.exe.4322520.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000000.00000002.447887037.00000000032BD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.447887037.00000000032BD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.447887037.00000000032BD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000E.00000000.444492363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000E.00000000.444492363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000E.00000000.444492363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000E.00000002.549837955.0000000005830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000E.00000002.549837955.0000000005830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000E.00000002.549837955.0000000005830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000E.00000002.549837955.0000000005830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000000.00000002.453904454.0000000004283000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.453904454.0000000004283000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.453904454.0000000004283000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000E.00000002.545716802.0000000003F72000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000E.00000002.545716802.0000000003F72000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: confirm order.exe PID: 5552, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: confirm order.exe PID: 5552, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: confirm order.exe PID: 5552, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: confirm order.exe PID: 1020, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: confirm order.exe PID: 1020, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: confirm order.exe PID: 1020, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: C:\Users\user\Desktop\confirm order.exeCode function: 0_2_016E0C6F
      Source: C:\Users\user\Desktop\confirm order.exeCode function: 0_2_0572AE99
      Source: C:\Users\user\Desktop\confirm order.exeCode function: 0_2_05722C00
      Source: C:\Users\user\Desktop\confirm order.exeCode function: 0_2_016E5A98
      Source: C:\Users\user\Desktop\confirm order.exeCode function: 14_2_02D7E480
      Source: C:\Users\user\Desktop\confirm order.exeCode function: 14_2_02D7E471
      Source: C:\Users\user\Desktop\confirm order.exeCode function: 14_2_02D7BBD4
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeCode function: 15_2_00F23001
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeCode function: 15_2_00F25AA8
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeCode function: 15_2_00F25A98
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeCode function: 15_2_010130C0
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeCode function: 15_2_01012C00
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeCode function: 15_2_0101AE9B
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs confirm order.exe
      Source: confirm order.exe, 00000000.00000003.427323783.0000000001741000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSzmwlcrt.exe" vs confirm order.exe
      Source: confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs confirm order.exe
      Source: confirm order.exe, 00000000.00000002.454858923.0000000005650000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAkozwmfugbadgyfrkgna.dll" vs confirm order.exe
      Source: confirm order.exe, 00000000.00000003.262094119.0000000004475000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAkozwmfugbadgyfrkgna.dll" vs confirm order.exe
      Source: confirm order.exe, 00000000.00000000.252951632.0000000000E94000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSzmwlcrt.exe" vs confirm order.exe
      Source: confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs confirm order.exe
      Source: confirm order.exe, 00000000.00000003.260970859.00000000041F6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAkozwmfugbadgyfrkgna.dll" vs confirm order.exe
      Source: confirm order.exe, 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs confirm order.exe
      Source: confirm order.exe, 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs confirm order.exe
      Source: confirm order.exe, 0000000E.00000002.550388497.0000000006000000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs confirm order.exe
      Source: confirm order.exe, 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs confirm order.exe
      Source: confirm order.exe, 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs confirm order.exe
      Source: confirm order.exe, 0000000E.00000002.535640943.0000000002FEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs confirm order.exe
      Source: confirm order.exe, 0000000E.00000002.545716802.0000000003F72000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs confirm order.exe
      Source: confirm order.exe, 0000000E.00000002.545716802.0000000003F72000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs confirm order.exe
      Source: confirm order.exe, 0000000E.00000002.545716802.0000000003F72000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs confirm order.exe
      Source: confirm order.exeBinary or memory string: OriginalFilenameSzmwlcrt.exe" vs confirm order.exe
      Source: confirm order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: Ugtphvhf.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: confirm order.exeReversingLabs: Detection: 40%
      Source: confirm order.exeVirustotal: Detection: 48%
      Source: C:\Users\user\Desktop\confirm order.exeFile read: C:\Users\user\Desktop\confirm order.exeJump to behavior
      Source: confirm order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\confirm order.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Users\user\Desktop\confirm order.exe "C:\Users\user\Desktop\confirm order.exe"
      Source: C:\Users\user\Desktop\confirm order.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA==
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\confirm order.exeProcess created: C:\Users\user\Desktop\confirm order.exe C:\Users\user\Desktop\confirm order.exe
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe "C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe"
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe "C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe"
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA==
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\confirm order.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA==
      Source: C:\Users\user\Desktop\confirm order.exeProcess created: C:\Users\user\Desktop\confirm order.exe C:\Users\user\Desktop\confirm order.exe
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA==
      Source: C:\Users\user\Desktop\confirm order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
      Source: C:\Users\user\Desktop\confirm order.exeFile created: C:\Users\user\AppData\Roaming\PrqhnsxJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5zzuybal.sto.ps1Jump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@11/10@0/2
      Source: C:\Users\user\Desktop\confirm order.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: confirm order.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      Source: C:\Users\user\Desktop\confirm order.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\confirm order.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2384:120:WilError_01
      Source: C:\Users\user\Desktop\confirm order.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{6a8dc68c-2ae6-4a66-b5dc-80cfa679c766}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1652:120:WilError_01
      Source: 14.0.confirm order.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 14.0.confirm order.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 14.0.confirm order.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\confirm order.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: confirm order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: confirm order.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: confirm order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdb source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561422892.00000000040E6000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdbSHA256w^ source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561422892.00000000040E6000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 0.3.confirm order.exe.44757d0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.5650000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.3.confirm order.exe.44757d0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.3.confirm order.exe.4295750.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.5650000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.3.confirm order.exe.42f5790.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.3.confirm order.exe.42b5770.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.447081649.00000000031D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.532222883.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.537850084.000000000314B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.454858923.0000000005650000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.262094119.0000000004475000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000F.00000002.532813764.00000000029BC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.532914557.000000000301C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000F.00000002.532893471.00000000029C5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.532978281.0000000003025000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000F.00000002.532109090.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.260970859.00000000041F6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000F.00000002.537794657.0000000002AEB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.448397158.0000000003358000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: confirm order.exe PID: 5552, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: Ugtphvhf.exe PID: 5292, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: Ugtphvhf.exe PID: 6072, type: MEMORYSTR
      Source: confirm order.exe, WindowsFormsApp92/Range.cs.Net Code: Internet System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: Ugtphvhf.exe.0.dr, WindowsFormsApp92/Range.cs.Net Code: Internet System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 0.0.confirm order.exe.dd0000.0.unpack, WindowsFormsApp92/Range.cs.Net Code: Internet System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 14.0.confirm order.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 14.0.confirm order.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\confirm order.exeCode function: 14_2_02D7D413 push 0000005Dh; retn 0004h
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeCode function: 15_2_04F376D7 push 5D5F5E5Bh; ret
      Source: confirm order.exeStatic PE information: 0xDA13C204 [Sun Dec 9 09:19:00 2085 UTC]
      Source: initial sampleStatic PE information: section name: .text entropy: 7.847324790581247
      Source: initial sampleStatic PE information: section name: .text entropy: 7.847324790581247
      Source: 14.0.confirm order.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 14.0.confirm order.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: C:\Users\user\Desktop\confirm order.exeFile created: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeJump to dropped file
      Source: C:\Users\user\Desktop\confirm order.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run UgtphvhfJump to behavior
      Source: C:\Users\user\Desktop\confirm order.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run UgtphvhfJump to behavior
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\confirm order.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: confirm order.exe, 00000000.00000002.447081649.00000000031D1000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.448397158.0000000003358000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.532893471.00000000029C5000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.532813764.00000000029BC000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.537794657.0000000002AEB000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.532109090.0000000002981000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.537850084.000000000314B000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.532222883.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.532978281.0000000003025000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.532914557.000000000301C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
      Source: C:\Users\user\Desktop\confirm order.exe TID: 5736Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 404Thread sleep time: -9223372036854770s >= -30000s
      Source: C:\Users\user\Desktop\confirm order.exe TID: 1916Thread sleep time: -13835058055282155s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4944Thread sleep time: -12912720851596678s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\confirm order.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\confirm order.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9346
      Source: C:\Users\user\Desktop\confirm order.exeWindow / User API: threadDelayed 9564
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9089
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\confirm order.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\confirm order.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: Ugtphvhf.exe, 00000010.00000002.528869500.00000000011F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: Ugtphvhf.exe, 00000010.00000002.532978281.0000000003025000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
      Source: Ugtphvhf.exe, 00000010.00000002.532914557.000000000301C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen"select * from Win32_ComputerSystem
      Source: Ugtphvhf.exe, 00000010.00000002.532914557.000000000301C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
      Source: confirm order.exe, 0000000E.00000002.528917807.00000000010D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Users\user\Desktop\confirm order.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\confirm order.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\confirm order.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\confirm order.exeProcess created: Base64 decoded Start-Sleep -Seconds 60
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess created: Base64 decoded Start-Sleep -Seconds 60
      Source: C:\Users\user\Desktop\confirm order.exeProcess created: Base64 decoded Start-Sleep -Seconds 60
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess created: Base64 decoded Start-Sleep -Seconds 60
      Source: C:\Users\user\Desktop\confirm order.exeMemory written: C:\Users\user\Desktop\confirm order.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\confirm order.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA==
      Source: C:\Users\user\Desktop\confirm order.exeProcess created: C:\Users\user\Desktop\confirm order.exe C:\Users\user\Desktop\confirm order.exe
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA==
      Source: confirm order.exe, 0000000E.00000002.537125222.0000000003048000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 0000000E.00000002.545181455.0000000003288000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 0000000E.00000002.550096606.0000000005EFB000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: confirm order.exe, 0000000E.00000002.542026048.00000000031A6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerHaSk
      Source: confirm order.exe, 0000000E.00000002.537125222.0000000003048000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 0000000E.00000002.540941892.000000000315E000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 0000000E.00000002.542026048.00000000031A6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerx
      Source: C:\Users\user\Desktop\confirm order.exeQueries volume information: C:\Users\user\Desktop\confirm order.exe VolumeInformation
      Source: C:\Users\user\Desktop\confirm order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Users\user\Desktop\confirm order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\Desktop\confirm order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\Desktop\confirm order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Users\user\Desktop\confirm order.exeQueries volume information: C:\Users\user\Desktop\confirm order.exe VolumeInformation
      Source: C:\Users\user\Desktop\confirm order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\confirm order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\confirm order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\confirm order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeQueries volume information: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe VolumeInformation
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeQueries volume information: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe VolumeInformation
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Users\user\Desktop\confirm order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 14.2.confirm order.exe.6010000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.3f8ff3c.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.3f94565.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.0.confirm order.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.42d2500.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.42aa4e0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.6014629.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.6010000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.42d2500.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.42aa4e0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.4322520.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.3f8b106.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.3f8ff3c.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.4322520.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000000.444492363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.453904454.0000000004283000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.545716802.0000000003F72000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: confirm order.exe PID: 5552, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: confirm order.exe PID: 1020, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: confirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: confirm order.exe, 00000000.00000002.447887037.00000000032BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: confirm order.exe, 00000000.00000002.453904454.0000000004283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: confirm order.exe, 0000000E.00000000.444492363.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: confirm order.exe, 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: confirm order.exe, 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: confirm order.exe, 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: confirm order.exe, 0000000E.00000002.545716802.0000000003F72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: confirm order.exe, 0000000E.00000002.545716802.0000000003F72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: Yara matchFile source: 14.2.confirm order.exe.6010000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.3f8ff3c.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.3f94565.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.0.confirm order.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.42d2500.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.42aa4e0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.6014629.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.6010000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.42d2500.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.42aa4e0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.4322520.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.3f8b106.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.confirm order.exe.3f8ff3c.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.confirm order.exe.4322520.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000000.444492363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.453904454.0000000004283000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.545716802.0000000003F72000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: confirm order.exe PID: 5552, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: confirm order.exe PID: 1020, type: MEMORYSTR
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      PowerShell
      1
      Registry Run Keys / Startup Folder
      112
      Process Injection
      1
      Masquerading
      11
      Input Capture
      21
      Security Software Discovery
      Remote Services11
      Input Capture
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      Registry Run Keys / Startup Folder
      1
      Disable or Modify Tools
      LSASS Memory2
      Process Discovery
      Remote Desktop Protocol11
      Archive Collected Data
      Exfiltration Over Bluetooth1
      Non-Standard Port
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
      Virtualization/Sandbox Evasion
      Security Account Manager21
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
      Remote Access Software
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer1
      Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
      Deobfuscate/Decode Files or Information
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common2
      Obfuscated Files or Information
      Cached Domain Credentials12
      System Information Discovery
      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items13
      Software Packing
      DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
      Timestomp
      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 712188 Sample: confirm order.exe Startdate: 29/09/2022 Architecture: WINDOWS Score: 100 40 Multi AV Scanner detection for domain / URL 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 Antivirus detection for URL or domain 2->44 46 13 other signatures 2->46 7 confirm order.exe 1 7 2->7         started        12 Ugtphvhf.exe 3 2->12         started        14 Ugtphvhf.exe 2 2->14         started        process3 dnsIp4 38 192.168.2.1 unknown unknown 7->38 30 C:\Users\user\AppData\...\Ugtphvhf.exe, PE32 7->30 dropped 32 C:\Users\...\Ugtphvhf.exe:Zone.Identifier, ASCII 7->32 dropped 34 C:\Users\user\...\confirm order.exe.log, ASCII 7->34 dropped 48 Encrypted powershell cmdline option found 7->48 50 Injects a PE file into a foreign processes 7->50 16 confirm order.exe 6 7->16         started        20 powershell.exe 16 7->20         started        52 Multi AV Scanner detection for dropped file 12->52 54 Machine Learning detection for dropped file 12->54 22 powershell.exe 11 12->22         started        file5 signatures6 process7 dnsIp8 36 146.70.76.43, 56281 TENET-1ZA United Kingdom 16->36 28 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 16->28 dropped 24 conhost.exe 20->24         started        26 conhost.exe 22->26         started        file9 process10

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      confirm order.exe40%ReversingLabsByteCode-MSIL.Trojan.Woreflint
      confirm order.exe49%VirustotalBrowse
      confirm order.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe40%ReversingLabsByteCode-MSIL.Trojan.Woreflint
      C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe49%VirustotalBrowse
      SourceDetectionScannerLabelLinkDownload
      14.0.confirm order.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      14.2.confirm order.exe.6010000.6.unpack100%AviraTR/NanoCore.fadteDownload File
      0.2.confirm order.exe.32e984c.0.unpack100%AviraHEUR/AGEN.1211686Download File
      No Antivirus matches
      SourceDetectionScannerLabelLink
      0%Avira URL Cloudsafe
      http://james.newtonking.com/projects/json0%URL Reputationsafe
      146.70.76.437%VirustotalBrowse
      146.70.76.43100%Avira URL Cloudmalware
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      true
      • Avira URL Cloud: safe
      low
      146.70.76.43true
      • 7%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://www.newtonsoft.com/jsonconfirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.563157770.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.563162662.0000000004189000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561455007.00000000040E9000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://www.nuget.org/packages/Newtonsoft.Json.Bsonconfirm order.exe, 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.455433787.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, confirm order.exe, 00000000.00000002.452265867.00000000036D4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.549759132.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561422892.00000000040E6000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://api.telegram.org/botconfirm order.exe, 00000000.00000002.447081649.00000000031D1000.00000004.00000800.00020000.00000000.sdmp, confirm order.exe, 00000000.00000002.448397158.0000000003358000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.532893471.00000000029C5000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.532813764.00000000029BC000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.537794657.0000000002AEB000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 0000000F.00000002.532109090.0000000002981000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.537850084.000000000314B000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.532222883.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.532978281.0000000003025000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.532914557.000000000301C000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameconfirm order.exe, 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://james.newtonking.com/projects/jsonUgtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.563075696.000000000417B000.00000004.00000800.00020000.00000000.sdmp, Ugtphvhf.exe, 00000010.00000002.561315549.00000000040DB000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.newtonsoft.com/jsonschemaUgtphvhf.exe, 00000010.00000002.549878196.00000000034E4000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                146.70.76.43
                unknownUnited Kingdom
                2018TENET-1ZAtrue
                IP
                192.168.2.1
                Joe Sandbox Version:36.0.0 Rainbow Opal
                Analysis ID:712188
                Start date and time:2022-09-29 01:14:32 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 11m 30s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:confirm order.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:19
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@11/10@0/2
                EGA Information:
                • Successful, ratio: 33.3%
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ocsp.digicert.com, ctldl.windowsupdate.com
                • Execution Graph export aborted for target Ugtphvhf.exe, PID 5292 because it is empty
                • Execution Graph export aborted for target confirm order.exe, PID 5552 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report creation exceeded maximum time and may have missing disassembly code information.
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                01:15:48API Interceptor75x Sleep call for process: powershell.exe modified
                01:16:55AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Ugtphvhf "C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe"
                01:17:01API Interceptor259x Sleep call for process: confirm order.exe modified
                01:17:03AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Ugtphvhf "C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe"
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\confirm order.exe
                File Type:ASCII text, with CRLF line terminators
                Category:modified
                Size (bytes):1039
                Entropy (8bit):5.3436815157474165
                Encrypted:false
                SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhyE4KdE4KBLWE4K5AE4Kzr7a:MxHKXwYHKhQnoyHKdHKBqHK5AHKzva
                MD5:6C24176D343957C767AA6536571797FA
                SHA1:64512F67A49AF75E9A67474DF54FCCD3472905B2
                SHA-256:63AB82B5B458425DB1E0831E1BB8CA642C602D9BCB0762A1E47C7836CACF3350
                SHA-512:D0DFB30B723CC1F0ADB8D9448220AC67A1A21243499B7EB31402CAA0CE9F6A892073E10C52D132E59BF2321F05DBB0973B7E1026023992FC33DE5AB74A6979A4
                Malicious:true
                Reputation:moderate, very likely benign file
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"System.Numerics, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\34957343ad5d84daee97a1affda91665\System.Runtime.Serialization.ni.dll",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b880
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):5829
                Entropy (8bit):4.8968676994158
                Encrypted:false
                SSDEEP:96:WCJ2Woe5o2k6Lm5emmXIGvgyg12jDs+un/iQLEYFjDaeWJ6KGcmXx9smyFRLcU6f:5xoe5oVsm5emd0gkjDt4iWN3yBGHh9s6
                MD5:36DE9155D6C265A1DE62A448F3B5B66E
                SHA1:02D21946CBDD01860A0DE38D7EEC6CDE3A964FC3
                SHA-256:8BA38D55AA8F1E4F959E7223FDF653ABB9BE5B8B5DE9D116604E1ABB371C1C87
                SHA-512:C734ADE161FB89472B1DF9B9F062F4A53E7010D3FF99EDC0BD564540A56BC35743625C50A00635C31D165A74DCDBB330FFB878C5919D7B267F6F33D2AAB328E7
                Malicious:false
                Preview:PSMODULECACHE......<.e...Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........<.e...T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):16496
                Entropy (8bit):5.551918786062227
                Encrypted:false
                SSDEEP:384:cte/cX0w99dEtxT8wnwSBx2u9FiJ9giSJ3uzp1UYv:cEvTZw4cu9picudv
                MD5:88C6EE654500840B8E087B519FBE988D
                SHA1:E28F65A25C048A90228F9EDF8C4A2DE4F35F2A6C
                SHA-256:63C122DE2BA73E9F2CE94D48F4D9F1459BC1638C964B491504E9814FA1A3319E
                SHA-512:FCD7A9867AB7EA689B84F73D4D61F2B1C6216458AB3A62BE712FA8B629FD6C793B50BB0D90D366469F29C62A2CFD50DC25096E5883F90B000200EBB2D7E258C3
                Malicious:false
                Preview:@...e...............................:.c..............@..........H...............<@.^.L."My...:'..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.............System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:U:U
                MD5:C4CA4238A0B923820DCC509A6F75849B
                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                Malicious:false
                Preview:1
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:U:U
                MD5:C4CA4238A0B923820DCC509A6F75849B
                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                Malicious:false
                Preview:1
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:U:U
                MD5:C4CA4238A0B923820DCC509A6F75849B
                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                Malicious:false
                Preview:1
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:U:U
                MD5:C4CA4238A0B923820DCC509A6F75849B
                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                Malicious:false
                Preview:1
                Process:C:\Users\user\Desktop\confirm order.exe
                File Type:Non-ISO extended-ASCII text, with no line terminators
                Category:dropped
                Size (bytes):8
                Entropy (8bit):2.75
                Encrypted:false
                SSDEEP:3:R:R
                MD5:AB8F38A645A923E8D95756E195EEACD1
                SHA1:6BFB7C2285D899A581993B3BAC912375BD55E71D
                SHA-256:0DC4B51B1A57A5DACD962B5FC7C7F52468E5C6861D9D9FD510272723AF26F567
                SHA-512:D266ADB99DFB589F5D13F3E6822EF8395DB557B5DF9B8B990DC957AF07253DAC32EA15147879E11E8FDBA32E536A0EF26D769F6C642D79427C6BCF6C3072EA51
                Malicious:true
                Preview:.q...H
                Process:C:\Users\user\Desktop\confirm order.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):983552
                Entropy (8bit):7.692774803542058
                Encrypted:false
                SSDEEP:24576:7iqtFNQVaIo1AMOJ2ySwNvxrRoi+EGbI5eOR:7iqvyYKMdyS6vxj+Ern
                MD5:E5E6A926238DFECD931967194FF92BF4
                SHA1:B233228269367904BB0EE23B0B47FABF50BA5DF2
                SHA-256:219EEB73337CB0CB6B1E4AF6093AF3C0F4BEF72AF443BE61ADF1B2DC7EAF9063
                SHA-512:A08A5E0A58981A77108AED095F5CCA7B37565EA470079DC6E7F4D462633D080421387159E885E20001F7AD9B28E73E62FC6021A450B543EC61FD19D63F160C79
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 40%
                • Antivirus: Virustotal, Detection: 49%, Browse
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ...@....@.. .......................`............@..................................-..O....@.......................@.......-............................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......@......................@..B.................-......H........!...............................................................(....*~s....s....s....(....(....(....*..(....*..0..+....... .........%.....(....(....%-.&...-.s....z.*..0..0........(....o....o....s...... .Zb.o........,..o......*.........$........(....*.0..:.......s.......+..(.....(.....i]....a.o......X....i2..o....%-.&.*B(....r...po....*B(....(....o....*..(....*Fs....%(....}....*.s....%.{....t....r...po ...ri..po!...}....*..(....*R.{....t".....o"...&*..(....*.BSJB....
                Process:C:\Users\user\Desktop\confirm order.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):26
                Entropy (8bit):3.95006375643621
                Encrypted:false
                SSDEEP:3:ggPYV:rPYV
                MD5:187F488E27DB4AF347237FE461A079AD
                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                Malicious:true
                Preview:[ZoneTransfer]....ZoneId=0
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.692774803542058
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                • Win32 Executable (generic) a (10002005/4) 49.78%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                • Generic Win/DOS Executable (2004/3) 0.01%
                File name:confirm order.exe
                File size:983552
                MD5:e5e6a926238dfecd931967194ff92bf4
                SHA1:b233228269367904bb0ee23b0b47fabf50ba5df2
                SHA256:219eeb73337cb0cb6b1e4af6093af3c0f4bef72af443be61adf1b2dc7eaf9063
                SHA512:a08a5e0a58981a77108aed095f5cca7b37565ea470079dc6e7f4d462633d080421387159e885e20001f7ad9b28e73e62fc6021a450b543ec61fd19d63f160c79
                SSDEEP:24576:7iqtFNQVaIo1AMOJ2ySwNvxrRoi+EGbI5eOR:7iqvyYKMdyS6vxj+Ern
                TLSH:6C25E1643D0C075AEACD0EB69E0057DE4EEE5D9F2E384F44BBC09EFE66425D621C0A49
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ...@....@.. .......................`............@................................
                Icon Hash:f8d8d0f0c0d0c0c0
                Entrypoint:0x402e0e
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0xDA13C204 [Sun Dec 9 09:19:00 2085 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                sbb al, 2Fh
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x2dbc0x4f.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x2ebdc.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0xf40000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x2da00x1c.text
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000xc10140xc1200False0.8617579389158576SysEx File -7.847324790581247IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0xc40000x2ebdc0x2ec00False0.34225643382352944data5.865926020313647IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0xf40000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_ICON0xc42000x6c1cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                RT_ICON0xcae2c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584
                RT_ICON0xdb6640x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016
                RT_ICON0xe4b1c0x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600
                RT_ICON0xe9fb40x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896
                RT_ICON0xee1ec0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600
                RT_ICON0xf07a40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224
                RT_ICON0xf185c0x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400
                RT_ICON0xf21f40x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088
                RT_GROUP_ICON0xf266c0x84data
                RT_VERSION0xf27000x2dcdata
                RT_MANIFEST0xf29ec0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                DLLImport
                mscoree.dll_CorExeMain
                TimestampSource PortDest PortSource IPDest IP
                Sep 29, 2022 01:17:04.084417105 CEST4970456281192.168.2.3146.70.76.43
                Sep 29, 2022 01:17:07.096297979 CEST4970456281192.168.2.3146.70.76.43
                Sep 29, 2022 01:17:13.112474918 CEST4970456281192.168.2.3146.70.76.43
                Sep 29, 2022 01:17:24.277153015 CEST4970556281192.168.2.3146.70.76.43
                Sep 29, 2022 01:17:27.426295042 CEST4970556281192.168.2.3146.70.76.43
                Sep 29, 2022 01:17:33.426664114 CEST4970556281192.168.2.3146.70.76.43
                Sep 29, 2022 01:17:44.852468014 CEST4970656281192.168.2.3146.70.76.43
                Sep 29, 2022 01:17:47.912234068 CEST4970656281192.168.2.3146.70.76.43
                Sep 29, 2022 01:17:53.912755966 CEST4970656281192.168.2.3146.70.76.43

                Click to jump to process

                Target ID:0
                Start time:01:15:28
                Start date:29/09/2022
                Path:C:\Users\user\Desktop\confirm order.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\confirm order.exe"
                Imagebase:0xdd0000
                File size:983552 bytes
                MD5 hash:E5E6A926238DFECD931967194FF92BF4
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.447081649.00000000031D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.447887037.00000000032BD000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.447887037.00000000032BD000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.447887037.00000000032BD000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.454452204.0000000004322000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.454858923.0000000005650000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000003.262094119.0000000004475000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.453904454.0000000004283000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.453904454.0000000004283000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.453904454.0000000004283000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.453904454.0000000004283000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000003.260970859.00000000041F6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.448397158.0000000003358000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low

                Target ID:1
                Start time:01:15:41
                Start date:29/09/2022
                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA==
                Imagebase:0x10000
                File size:430592 bytes
                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Reputation:high

                Target ID:2
                Start time:01:15:41
                Start date:29/09/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff745070000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:14
                Start time:01:16:58
                Start date:29/09/2022
                Path:C:\Users\user\Desktop\confirm order.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\confirm order.exe
                Imagebase:0x9b0000
                File size:983552 bytes
                MD5 hash:E5E6A926238DFECD931967194FF92BF4
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000000.444492363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000000.444492363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 0000000E.00000000.444492363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000000.444492363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.549837955.0000000005830000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000E.00000002.549837955.0000000005830000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000E.00000002.549837955.0000000005830000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.549837955.0000000005830000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.550441938.0000000006010000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.532820383.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.545716802.0000000003F72000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.545716802.0000000003F72000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.545716802.0000000003F72000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                Reputation:low

                Target ID:15
                Start time:01:17:03
                Start date:29/09/2022
                Path:C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe"
                Imagebase:0x510000
                File size:983552 bytes
                MD5 hash:E5E6A926238DFECD931967194FF92BF4
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000F.00000002.532813764.00000000029BC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000F.00000002.532893471.00000000029C5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000F.00000002.532109090.0000000002981000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000F.00000002.537794657.0000000002AEB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Antivirus matches:
                • Detection: 100%, Joe Sandbox ML
                • Detection: 40%, ReversingLabs
                • Detection: 49%, Virustotal, Browse
                Reputation:low

                Target ID:16
                Start time:01:17:12
                Start date:29/09/2022
                Path:C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Roaming\Prqhnsx\Ugtphvhf.exe"
                Imagebase:0xb30000
                File size:983552 bytes
                MD5 hash:E5E6A926238DFECD931967194FF92BF4
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000010.00000002.532222883.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000010.00000002.537850084.000000000314B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000010.00000002.532914557.000000000301C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000010.00000002.532978281.0000000003025000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low

                Target ID:17
                Start time:01:17:24
                Start date:29/09/2022
                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA==
                Imagebase:0x10000
                File size:430592 bytes
                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:.Net C# or VB.NET
                Reputation:high

                Target ID:18
                Start time:01:17:24
                Start date:29/09/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff745070000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high

                No disassembly