Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
new order.exe

Overview

General Information

Sample Name:new order.exe
Analysis ID:712322
MD5:450aa1d2ac8e10a3b8363fe2945462bd
SHA1:173275f693a10f8919c45dfb21f8035c7bc45fb6
SHA256:316ff42588b6cf8c5a435efb67d44d08a2d860bab89612fc3e85ec6e9f4b4455
Tags:exeNanoCore
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Connects to many ports of the same IP (likely port scanning)
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Encrypted powershell cmdline option found
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
PE / OLE file has an invalid certificate
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • new order.exe (PID: 5796 cmdline: "C:\Users\user\Desktop\new order.exe" MD5: 450AA1D2AC8E10A3B8363FE2945462BD)
    • powershell.exe (PID: 492 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA== MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • InstallUtil.exe (PID: 2344 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • Luqkasd.exe (PID: 1016 cmdline: "C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exe" MD5: 450AA1D2AC8E10A3B8363FE2945462BD)
    • powershell.exe (PID: 5636 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA== MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • Luqkasd.exe (PID: 628 cmdline: "C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exe" MD5: 450AA1D2AC8E10A3B8363FE2945462BD)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "6a8dc68c-2ae6-4a66-b5dc-80cfa679", "Group": "jop", "Domain1": "146.70.76.43", "Domain2": "", "Port": 56281, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 9, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
0000000F.00000002.527779375.00000000033BB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.466623981.000000000427E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000000.00000002.466623981.000000000427E000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x2aa65:$a: NanoCore
      • 0x2ac25:$a: NanoCore
      • 0x2d674:$a: NanoCore
      • 0x2d69a:$a: NanoCore
      • 0x2d9cb:$a: NanoCore
      • 0x350aa:$a: NanoCore
      • 0x2d67d:$b: ClientPlugin
      • 0x2d6a3:$b: ClientPlugin
      • 0x2d9d4:$b: ClientPlugin
      • 0x3456b:$c: ProjectData
      • 0x2fd3a:$d: DESCrypto
      • 0x304b5:$e: KeepAlive
      • 0x2f5e7:$g: LogClientMessage
      • 0x2dc43:$i: get_Connected
      • 0x2acf4:$j: #=q
      • 0x2ad38:$j: #=q
      • 0x2ad54:$j: #=q
      • 0x2ad96:$j: #=q
      • 0x2adb2:$j: #=q
      • 0x2adce:$j: #=q
      • 0x2ae26:$j: #=q
      00000000.00000002.466623981.000000000427E000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
      • 0x2d69a:$a1: NanoCore.ClientPluginHost
      • 0x2d9cb:$a2: NanoCore.ClientPlugin
      • 0x2d6c7:$b1: get_BuilderSettings
      • 0x35047:$b2: ClientLoaderForm.resources
      • 0x2b5d5:$b3: PluginCommand
      • 0x2ddba:$b4: IClientAppHost
      • 0x319bc:$b5: GetBlockHash
      • 0x2dccf:$b6: AddHostEntry
      • 0x2f5d4:$b7: LogClientException
      • 0x2dc90:$b8: PipeExists
      • 0x2dda7:$b9: IClientLoggingHost
      0000000F.00000002.527200680.0000000003371000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        Click to see the 40 entries
        SourceRuleDescriptionAuthorStrings
        0.2.new order.exe.412f488.2.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0x5044d:$x1: NanoCore Client.exe
        • 0x50dfd:$s1: PluginCommand
        • 0x50df1:$s2: FileCommand
        0.2.new order.exe.5570000.5.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          14.2.InstallUtil.exe.5e04629.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xb184:$x1: NanoCore.ClientPluginHost
          • 0xb1b1:$x2: IClientNetworkHost
          14.2.InstallUtil.exe.5e04629.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0xb184:$x2: NanoCore.ClientPluginHost
          • 0xc25f:$s4: PipeCreated
          • 0xb19e:$s5: IClientLoggingHost
          14.2.InstallUtil.exe.5e04629.5.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
            Click to see the 87 entries

            AV Detection

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ProcessId: 2344, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            E-Banking Fraud

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ProcessId: 2344, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Stealing of Sensitive Information

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ProcessId: 2344, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Remote Access Functionality

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ProcessId: 2344, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: new order.exeReversingLabs: Detection: 31%
            Source: new order.exeVirustotal: Detection: 35%Perma Link
            Source: 146.70.76.43Avira URL Cloud: Label: malware
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeReversingLabs: Detection: 31%
            Source: Yara matchFile source: 14.2.InstallUtil.exe.5e04629.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.427e3f8.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.3d4ff3c.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.5e00000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.427e3f8.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.41574a8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.3d4b106.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.41574a8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.5e00000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.3d4ff3c.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.3d54565.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.412f488.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.466623981.000000000427E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000000.450018784.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.533662558.0000000003D29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.466145560.00000000041DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: new order.exe PID: 5796, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 2344, type: MEMORYSTR
            Source: new order.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeJoe Sandbox ML: detected
            Source: 14.2.InstallUtil.exe.5e00000.6.unpackAvira: Label: TR/NanoCore.fadte
            Source: 14.0.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
            Source: 0000000E.00000002.533662558.0000000003D29000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6a8dc68c-2ae6-4a66-b5dc-80cfa679", "Group": "jop", "Domain1": "146.70.76.43", "Domain2": "", "Port": 56281, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 9, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
            Source: new order.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: new order.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdb source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.455076504.0000000003120000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.547137071.00000000044F7000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdbSHA256w^ source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.455076504.0000000003120000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.547137071.00000000044F7000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmp

            Networking

            barindex
            Source: global trafficTCP traffic: 146.70.76.43 ports 56281,1,2,5,6,8
            Source: Malware configuration extractorURLs:
            Source: Malware configuration extractorURLs: 146.70.76.43
            Source: Joe Sandbox ViewASN Name: TENET-1ZA TENET-1ZA
            Source: Joe Sandbox ViewIP Address: 146.70.76.43 146.70.76.43
            Source: global trafficTCP traffic: 192.168.2.7:49707 -> 146.70.76.43:56281
            Source: unknownTCP traffic detected without corresponding DNS query: 146.70.76.43
            Source: unknownTCP traffic detected without corresponding DNS query: 146.70.76.43
            Source: unknownTCP traffic detected without corresponding DNS query: 146.70.76.43
            Source: unknownTCP traffic detected without corresponding DNS query: 146.70.76.43
            Source: unknownTCP traffic detected without corresponding DNS query: 146.70.76.43
            Source: unknownTCP traffic detected without corresponding DNS query: 146.70.76.43
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.548140629.0000000004519000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.548137482.0000000004599000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.548140629.0000000004519000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.548137482.0000000004599000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.455076504.0000000003120000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA.crt0
            Source: new order.exe, Luqkasd.exe.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.548140629.0000000004519000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.548137482.0000000004599000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.455076504.0000000003120000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.455076504.0000000003120000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA.crl0E
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.548140629.0000000004519000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.548137482.0000000004599000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.548140629.0000000004519000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.548137482.0000000004599000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.455076504.0000000003120000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA.crl0L
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.548140629.0000000004519000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.548137482.0000000004599000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
            Source: Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://james.newtonking.com/projects/json
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.548140629.0000000004519000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.548137482.0000000004599000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.455076504.0000000003120000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0K
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.455076504.0000000003120000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0N
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.548140629.0000000004519000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.548137482.0000000004599000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
            Source: new order.exe, Luqkasd.exe.0.drString found in binary or memory: http://ocsp.thawte.com0
            Source: InstallUtil.exe, 0000000E.00000002.527475187.0000000002D29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: new order.exe, Luqkasd.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
            Source: new order.exe, Luqkasd.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
            Source: new order.exe, Luqkasd.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.548140629.0000000004519000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.548137482.0000000004599000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
            Source: new order.exe, Luqkasd.exe.0.drString found in binary or memory: http://www.naver.com0
            Source: new order.exe, 00000000.00000002.453841918.0000000003031000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.457661334.00000000032A8000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.527779375.00000000033BB000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.527200680.0000000003371000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.533387647.00000000035B4000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.527732524.00000000033B2000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.528679468.000000000347F000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.527935405.000000000343B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.455076504.0000000003120000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.548140629.0000000004519000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.548137482.0000000004599000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.455076504.0000000003120000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.548140629.0000000004519000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.548137482.0000000004599000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.newtonsoft.com/json
            Source: Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.newtonsoft.com/jsonschema
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.455076504.0000000003120000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.547137071.00000000044F7000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.nuget.org/packages/Newtonsoft.Json.Bson
            Source: InstallUtil.exe, 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 14.2.InstallUtil.exe.5e04629.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.427e3f8.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.3d4ff3c.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.5e00000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.427e3f8.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.41574a8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.3d4b106.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.41574a8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.5e00000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.3d4ff3c.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.3d54565.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.412f488.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.466623981.000000000427E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000000.450018784.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.533662558.0000000003D29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.466145560.00000000041DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: new order.exe PID: 5796, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 2344, type: MEMORYSTR

            System Summary

            barindex
            Source: 14.2.InstallUtil.exe.5e04629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 14.2.InstallUtil.exe.5e04629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 14.2.InstallUtil.exe.5e04629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0.2.new order.exe.427e3f8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.new order.exe.427e3f8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.new order.exe.427e3f8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.new order.exe.427e3f8.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.new order.exe.427e3f8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 14.2.InstallUtil.exe.3d4ff3c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 14.2.InstallUtil.exe.3d4ff3c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 14.2.InstallUtil.exe.3d4ff3c.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 14.2.InstallUtil.exe.5660000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 14.2.InstallUtil.exe.5660000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 14.2.InstallUtil.exe.5660000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 14.2.InstallUtil.exe.5e00000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 14.2.InstallUtil.exe.5e00000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 14.2.InstallUtil.exe.5e00000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0.2.new order.exe.427e3f8.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.new order.exe.427e3f8.4.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.new order.exe.427e3f8.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.new order.exe.427e3f8.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.new order.exe.427e3f8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0.2.new order.exe.41574a8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.new order.exe.41574a8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.new order.exe.41574a8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.new order.exe.41574a8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.new order.exe.41574a8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 14.2.InstallUtil.exe.3d4b106.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 14.2.InstallUtil.exe.3d4b106.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 14.2.InstallUtil.exe.3d4b106.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 14.2.InstallUtil.exe.3d4b106.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0.2.new order.exe.41574a8.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.new order.exe.41574a8.3.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.new order.exe.41574a8.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.new order.exe.41574a8.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.new order.exe.41574a8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 14.2.InstallUtil.exe.5e00000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 14.2.InstallUtil.exe.5e00000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 14.2.InstallUtil.exe.5e00000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 14.2.InstallUtil.exe.3d4ff3c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 14.2.InstallUtil.exe.3d4ff3c.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 14.2.InstallUtil.exe.3d4ff3c.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 14.2.InstallUtil.exe.3d54565.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 14.2.InstallUtil.exe.3d54565.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 14.2.InstallUtil.exe.3d54565.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 14.2.InstallUtil.exe.2d825f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 14.2.InstallUtil.exe.2d825f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 14.2.InstallUtil.exe.2d825f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0.2.new order.exe.412f488.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.new order.exe.412f488.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.new order.exe.412f488.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.new order.exe.412f488.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.new order.exe.412f488.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 00000000.00000002.466623981.000000000427E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000002.466623981.000000000427E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0000000E.00000000.450018784.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000E.00000000.450018784.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0000000E.00000002.527475187.0000000002D29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0000000E.00000002.533662558.0000000003D29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000E.00000002.533662558.0000000003D29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 00000000.00000002.466145560.00000000041DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000002.466145560.00000000041DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0000000E.00000002.538073119.0000000005660000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000E.00000002.538073119.0000000005660000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0000000E.00000002.538073119.0000000005660000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: Process Memory Space: new order.exe PID: 5796, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: new order.exe PID: 5796, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: Process Memory Space: InstallUtil.exe PID: 2344, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: InstallUtil.exe PID: 2344, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: initial sampleStatic PE information: Filename: new order.exe
            Source: new order.exe, WindowsFormsApp22/Immediately.csLarge array initialization: GetBuffer: array initializer size 835072
            Source: Luqkasd.exe.0.dr, WindowsFormsApp22/Immediately.csLarge array initialization: GetBuffer: array initializer size 835072
            Source: 0.0.new order.exe.bb0000.0.unpack, WindowsFormsApp22/Immediately.csLarge array initialization: GetBuffer: array initializer size 835072
            Source: new order.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.new order.exe.412f488.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.5e04629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.5e04629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.5e04629.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 14.2.InstallUtil.exe.5e04629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0.2.new order.exe.427e3f8.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.new order.exe.427e3f8.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.new order.exe.427e3f8.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.new order.exe.427e3f8.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.new order.exe.427e3f8.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0.2.new order.exe.427e3f8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 14.2.InstallUtil.exe.3d4ff3c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.3d4ff3c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.3d4ff3c.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 14.2.InstallUtil.exe.3d4ff3c.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 14.2.InstallUtil.exe.5660000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.5660000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.5660000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 14.2.InstallUtil.exe.5660000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 14.2.InstallUtil.exe.5e00000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.5e00000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.5e00000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 14.2.InstallUtil.exe.5e00000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0.2.new order.exe.427e3f8.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.new order.exe.427e3f8.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.new order.exe.427e3f8.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.new order.exe.427e3f8.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.new order.exe.427e3f8.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0.2.new order.exe.427e3f8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0.2.new order.exe.41574a8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.new order.exe.41574a8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.new order.exe.41574a8.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.new order.exe.41574a8.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.new order.exe.41574a8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0.2.new order.exe.41574a8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 14.2.InstallUtil.exe.3d4b106.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.3d4b106.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.3d4b106.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 14.2.InstallUtil.exe.3d4b106.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 14.2.InstallUtil.exe.3d4b106.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0.2.new order.exe.41574a8.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.new order.exe.41574a8.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.new order.exe.41574a8.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.new order.exe.41574a8.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.new order.exe.41574a8.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0.2.new order.exe.41574a8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 14.2.InstallUtil.exe.5e00000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.5e00000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.5e00000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 14.2.InstallUtil.exe.5e00000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 14.2.InstallUtil.exe.3d4ff3c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.3d4ff3c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.3d4ff3c.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 14.2.InstallUtil.exe.3d4ff3c.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 14.2.InstallUtil.exe.3d54565.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.3d54565.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.3d54565.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 14.2.InstallUtil.exe.3d54565.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 14.2.InstallUtil.exe.2d825f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.InstallUtil.exe.2d825f8.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 14.2.InstallUtil.exe.2d825f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0.2.new order.exe.412f488.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.new order.exe.412f488.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.new order.exe.412f488.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.new order.exe.412f488.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0.2.new order.exe.412f488.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 00000000.00000002.466623981.000000000427E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000000.00000002.466623981.000000000427E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0000000E.00000000.450018784.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000E.00000000.450018784.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0000000E.00000002.527475187.0000000002D29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0000000E.00000002.533662558.0000000003D29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000E.00000002.533662558.0000000003D29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 00000000.00000002.466145560.00000000041DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000000.00000002.466145560.00000000041DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0000000E.00000002.538073119.0000000005660000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0000000E.00000002.538073119.0000000005660000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0000000E.00000002.538073119.0000000005660000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0000000E.00000002.538073119.0000000005660000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: Process Memory Space: new order.exe PID: 5796, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: new order.exe PID: 5796, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: Process Memory Space: InstallUtil.exe PID: 2344, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: InstallUtil.exe PID: 2344, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_05736C20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_02AB53C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_02AB53B8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_02AB5138
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_02AB5148
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_02ABDDF4
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeCode function: 15_2_01A2C198
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeCode function: 15_2_01A28628
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeCode function: 15_2_01A26001
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeCode function: 15_2_05B80388
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeCode function: 15_2_05C36C99
            Source: new order.exe, 00000000.00000003.255565605.0000000004056000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKltkjctpbx.dll" vs new order.exe
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs new order.exe
            Source: new order.exe, 00000000.00000002.467477543.0000000005570000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameKltkjctpbx.dll" vs new order.exe
            Source: new order.exe, 00000000.00000002.455076504.0000000003120000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs new order.exe
            Source: new order.exe, 00000000.00000000.248992929.0000000000C80000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCjjlikwhv.exe: vs new order.exe
            Source: new order.exe, 00000000.00000002.452959081.00000000014F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCjjlikwhv.exe: vs new order.exe
            Source: new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs new order.exe
            Source: new order.exe, 00000000.00000003.257014991.00000000042E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKltkjctpbx.dll" vs new order.exe
            Source: new order.exeBinary or memory string: OriginalFilenameCjjlikwhv.exe: vs new order.exe
            Source: new order.exeStatic PE information: invalid certificate
            Source: new order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: Luqkasd.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: new order.exeReversingLabs: Detection: 31%
            Source: new order.exeVirustotal: Detection: 35%
            Source: C:\Users\user\Desktop\new order.exeFile read: C:\Users\user\Desktop\new order.exeJump to behavior
            Source: new order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\new order.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\new order.exe "C:\Users\user\Desktop\new order.exe"
            Source: C:\Users\user\Desktop\new order.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA==
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\new order.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exe "C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exe "C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exe"
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA==
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\new order.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA==
            Source: C:\Users\user\Desktop\new order.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA==
            Source: C:\Users\user\Desktop\new order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
            Source: C:\Users\user\Desktop\new order.exeFile created: C:\Users\user\AppData\Roaming\ZnxqmfqxvJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_erq5o4m0.rrv.ps1Jump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winEXE@11/10@0/1
            Source: C:\Users\user\Desktop\new order.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: new order.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            Source: C:\Users\user\Desktop\new order.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5648:120:WilError_01
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{6a8dc68c-2ae6-4a66-b5dc-80cfa679c766}
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6084:120:WilError_01
            Source: 14.0.InstallUtil.exe.400000.0.unpack, zoQNaMBUfplL9p8PJt6/tZlT4vBv477UZryCNUH.csCryptographic APIs: 'CreateDecryptor'
            Source: 14.0.InstallUtil.exe.400000.0.unpack, zoQNaMBUfplL9p8PJt6/tZlT4vBv477UZryCNUH.csCryptographic APIs: 'CreateDecryptor'
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\new order.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: new order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: new order.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: new order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdb source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.455076504.0000000003120000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.547137071.00000000044F7000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdbSHA256w^ source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.455076504.0000000003120000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.547137071.00000000044F7000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 0.2.new order.exe.5570000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.5570000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.new order.exe.42e13d0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.new order.exe.42e13d0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.new order.exe.4121370.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.new order.exe.4161390.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.new order.exe.4101350.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000F.00000002.527779375.00000000033BB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.527200680.0000000003371000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.453841918.0000000003031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.255565605.0000000004056000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.527732524.00000000033B2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.467477543.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.533387647.00000000035B4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.528679468.000000000347F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.527935405.000000000343B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.457661334.00000000032A8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.257014991.00000000042E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: new order.exe PID: 5796, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Luqkasd.exe PID: 1016, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Luqkasd.exe PID: 628, type: MEMORYSTR
            Source: new order.exe, WindowsFormsApp22/Loud.cs.Net Code: Shows System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: Luqkasd.exe.0.dr, WindowsFormsApp22/Loud.cs.Net Code: Shows System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.0.new order.exe.bb0000.0.unpack, WindowsFormsApp22/Loud.cs.Net Code: Shows System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 14.0.InstallUtil.exe.400000.0.unpack, zoQNaMBUfplL9p8PJt6/tZlT4vBv477UZryCNUH.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[] { typeof(IntPtr), typeof(Type) })
            Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_0573F470 push eax; ret
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_02AB1C67 push ebx; iretd
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeCode function: 15_2_01A2FCA6 push esp; iretd
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeCode function: 15_2_05B2AB80 push esi; retn 0005h
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeCode function: 15_2_05B2A408 push eax; retn 0005h
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeCode function: 15_2_05B2A447 push eax; retn 0005h
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeCode function: 15_2_05B2AD79 push edi; retn 0005h
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeCode function: 15_2_05B2AD41 push edi; retn 0005h
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeCode function: 15_2_05B2ACB0 push esi; retn 0005h
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeCode function: 15_2_05B2AC52 push esi; retn 0005h
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeCode function: 15_2_05C3F470 push eax; ret
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeCode function: 15_2_05C31268 push esp; retn 0005h
            Source: new order.exeStatic PE information: 0xA395936A [Tue Dec 19 22:00:10 2056 UTC]
            Source: initial sampleStatic PE information: section name: .text entropy: 7.858504462208288
            Source: initial sampleStatic PE information: section name: .text entropy: 7.858504462208288
            Source: 14.0.InstallUtil.exe.400000.0.unpack, MjCv8pCxloGsPKfv8Zo/hhq7qoCJyPh8gg3cXDt.csHigh entropy of concatenated method names: '.cctor', 'MOpCeR9uOr', 'SuRCmTHVaa', 'PEnCtn6nb3', 'uvvCdtIKGY', 'f21CcnXKNj', 'P9LCODoerE', 'GwMCISImbg', 'vM7CLTvMHo', 'OuHCT4OnOp'
            Source: 14.0.InstallUtil.exe.400000.0.unpack, so9pXHGubonp9oD9jZy/aN1lZ5GK618TreOL4qq.csHigh entropy of concatenated method names: 'VpuGqSmNvC', 'VB6G5regrN', 'LteGDyOZXJ', 'tKhG4Y5D15', 'CxWGgeLMkL', 'D8VG6aukwI', 'r6OGyULqXw', 'r0fGl7bjpe', 'DIxRdsF4EWsb2GTXZYM', 'Fl2PXBFg5Jec3gsKWpZ'
            Source: 14.0.InstallUtil.exe.400000.0.unpack, nPwYhMM5n6ybuLjPvm/KoJnbZ9epp8dEjsW4C.csHigh entropy of concatenated method names: 'kn5sPvw9K', 'OinjDqQbr', 'GPZngm74D', 'A3435JdZ4', 'pHuQRoR4v', 'W67aMFBYK', 'u00Vc7BsF', 'WkPPcdiW1oDMeP98i6N', 'tahAe6iLg6HFNnQtsyY', 'kEh8j0iTSSVIwk19F5F'
            Source: 14.0.InstallUtil.exe.400000.0.unpack, iecHr9hnTZADedu0Lke/Cijy0bhjx0rXG2ZuSv0.csHigh entropy of concatenated method names: 'cVLh33MmJy', 'O4QhQ203AZ', 'jBuhaccePu', 'TvnhVhH0VR', 'q0OhzmrD7h', 'CroGEKL2b9', 'knoGCOjoel', 'QaAGXivgkh', 'P74GpTEJ47', 'tj8Gb2jiv7'
            Source: 14.0.InstallUtil.exe.400000.0.unpack, PT1iG3h7PyaLGEcqBjd/Hw5kJUhZolDWapgjXxt.csHigh entropy of concatenated method names: 'Q5vh2sw8s9', 'OsThPj08UY', 'hYRhiDNf4l', 'bRmhw1G7G9', 'pKmhSQiyuC', 'dQWhFEYFsj', 'OeZh1MWfaV', 'AZOhJJ06J0', 'rE0hxQUeUX', 'nWXhe1tDrs'
            Source: 14.0.InstallUtil.exe.400000.0.unpack, aH7Mikb5CxeE6J8YHu1/a0F7ElbqrqyFcMYY5cP.csHigh entropy of concatenated method names: '.cctor', 'mkAbDj2qTR', 'jnrb4lH0oC', 'aCWPQJSMpuyBsU7XuHE', 'UBQv9oSsElnYV0i6NBV', 'i5MSdFSjDragw6jGFcZ', 'bKway7Sn6fyHJIKIjse', 'ry7fNLS3uDlwqIb31Z8'
            Source: 14.0.InstallUtil.exe.400000.0.unpack, XODHnBbXduO3pYpV1aA/DykUTKbCoBSEFJXkvTK.csHigh entropy of concatenated method names: 'ksRbp8sRIv', 'RKSbbGTtWF', 'hK3bhrVILv', 'PxqbGuciPG', 'zD6bHKP6DI', 'NJ3bBkjR9D', 'FsXbkHK2GU', 'Jo4bAOLITg', 'CjVbvWaxKA', 'e60bUlEYXB'
            Source: 14.0.InstallUtil.exe.400000.0.unpack, zoQNaMBUfplL9p8PJt6/tZlT4vBv477UZryCNUH.csHigh entropy of concatenated method names: '.cctor', 'sGNJ8DL5iE', 'zn8BreZP6q', 'pTVBoOP8mJ', 'LhYBN9qaDT', 'viUBZjvYeX', 'EWaB7A1fk2', 'o7UB2XkIlt', 'coxBPElosM', '.ctor'
            Source: C:\Users\user\Desktop\new order.exeFile created: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeJump to dropped file
            Source: C:\Users\user\Desktop\new order.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run LuqkasdJump to behavior
            Source: C:\Users\user\Desktop\new order.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run LuqkasdJump to behavior
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: new order.exe, 00000000.00000002.453841918.0000000003031000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.457661334.00000000032A8000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.527779375.00000000033BB000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.527200680.0000000003371000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.533387647.00000000035B4000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.527732524.00000000033B2000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.528679468.000000000347F000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.527935405.000000000343B000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.527895968.0000000003432000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: C:\Users\user\Desktop\new order.exe TID: 5776Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5080Thread sleep time: -1844674407370954s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 4740Thread sleep time: -18446744073709540s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5692Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\new order.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9671
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 9681
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3806
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\new order.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: InstallUtil.exe, 0000000E.00000002.524376505.0000000000F0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll$_{
            Source: Luqkasd.exe, 00000010.00000002.527935405.000000000343B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual/(RemoteThreadSuspended) [-] NtResumeThread: {0}6(AM51) [-] NtProtectVirtualMemory, PAGE_READWRITE: {0}
            Source: Luqkasd.exe, 00000010.00000002.527935405.000000000343B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen"select * from Win32_ComputerSystem5(RemoteThreadSuspended) [-] NtWriteVirtualMemory: {0}F(RemoteThreadSuspended) [-] NtProtectVirtualMemory, PAGE_NOACCESS: {0}C(RemoteThreadSuspended) [-] NtCreateThreadEx, CREATE_SUSPENDED: {0}J(RemoteThreadSuspended) [-] NtProtectVirtualMemory, PAGE_EXECUTE_READ: {0}
            Source: Luqkasd.exe, 00000010.00000002.528679468.000000000347F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
            Source: Luqkasd.exe, 00000010.00000002.524703283.00000000017E7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}p
            Source: Luqkasd.exe, 00000010.00000002.528679468.000000000347F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
            Source: C:\Users\user\Desktop\new order.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\new order.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\new order.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000
            Source: C:\Users\user\Desktop\new order.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000
            Source: C:\Users\user\Desktop\new order.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 43E000
            Source: C:\Users\user\Desktop\new order.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 454000
            Source: C:\Users\user\Desktop\new order.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: ADA008
            Source: 14.0.InstallUtil.exe.400000.0.unpack, FNhpSLpREWJ2Li3wGSe/xOAwujpWPeLluKtLROa.csReference to suspicious API methods: ('rjRp0G3srl', 'OpenProcess@kernel32.dll'), ('h8UpyUnqC0', 'FindResourceEx@kernel32.dll')
            Source: 14.0.InstallUtil.exe.400000.0.unpack, zoQNaMBUfplL9p8PJt6/tZlT4vBv477UZryCNUH.csReference to suspicious API methods: ('aVFB0ugbsX', 'GetProcAddress@kernel32'), ('pC2BYbLwIE', 'LoadLibrary@kernel32')
            Source: C:\Users\user\Desktop\new order.exeProcess created: Base64 decoded Start-Sleep -Seconds 60
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess created: Base64 decoded Start-Sleep -Seconds 60
            Source: C:\Users\user\Desktop\new order.exeProcess created: Base64 decoded Start-Sleep -Seconds 60
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess created: Base64 decoded Start-Sleep -Seconds 60
            Source: C:\Users\user\Desktop\new order.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\new order.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA==
            Source: C:\Users\user\Desktop\new order.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA==
            Source: InstallUtil.exe, 0000000E.00000002.527050487.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000002.531821617.0000000002EA2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000002.538933435.0000000005F5E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: InstallUtil.exe, 0000000E.00000002.527050487.0000000002D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerx
            Source: C:\Users\user\Desktop\new order.exeQueries volume information: C:\Users\user\Desktop\new order.exe VolumeInformation
            Source: C:\Users\user\Desktop\new order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
            Source: C:\Users\user\Desktop\new order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\Desktop\new order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\Desktop\new order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeQueries volume information: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeQueries volume information: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Users\user\Desktop\new order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 14.2.InstallUtil.exe.5e04629.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.427e3f8.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.3d4ff3c.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.5e00000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.427e3f8.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.41574a8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.3d4b106.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.41574a8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.5e00000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.3d4ff3c.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.3d54565.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.412f488.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.466623981.000000000427E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000000.450018784.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.533662558.0000000003D29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.466145560.00000000041DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: new order.exe PID: 5796, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 2344, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: new order.exe, 00000000.00000002.466623981.000000000427E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: new order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: new order.exe, 00000000.00000002.466145560.00000000041DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: InstallUtil.exe, 0000000E.00000000.450018784.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: InstallUtil.exe, 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: InstallUtil.exe, 0000000E.00000002.527475187.0000000002D29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: InstallUtil.exe, 0000000E.00000002.527475187.0000000002D29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: InstallUtil.exe, 0000000E.00000002.533662558.0000000003D29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: InstallUtil.exe, 0000000E.00000002.533662558.0000000003D29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: Yara matchFile source: 14.2.InstallUtil.exe.5e04629.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.427e3f8.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.3d4ff3c.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.5e00000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.427e3f8.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.41574a8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.3d4b106.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.41574a8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.5e00000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.3d4ff3c.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.InstallUtil.exe.3d54565.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.new order.exe.412f488.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.466623981.000000000427E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000000.450018784.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.533662558.0000000003D29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.466145560.00000000041DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: new order.exe PID: 5796, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 2344, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1
            Native API
            1
            Registry Run Keys / Startup Folder
            212
            Process Injection
            1
            Masquerading
            11
            Input Capture
            21
            Security Software Discovery
            Remote Services11
            Input Capture
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default Accounts1
            PowerShell
            Boot or Logon Initialization Scripts1
            Registry Run Keys / Startup Folder
            1
            Disable or Modify Tools
            LSASS Memory2
            Process Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            Exfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
            Virtualization/Sandbox Evasion
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
            Remote Access Software
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)212
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer1
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common2
            Obfuscated Files or Information
            Cached Domain Credentials12
            System Information Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items23
            Software Packing
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
            Timestomp
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 712322 Sample: new order.exe Startdate: 29/09/2022 Architecture: WINDOWS Score: 100 37 Malicious sample detected (through community Yara rule) 2->37 39 Antivirus detection for URL or domain 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 14 other signatures 2->43 7 new order.exe 1 7 2->7         started        11 Luqkasd.exe 3 2->11         started        13 Luqkasd.exe 2 2->13         started        process3 file4 29 C:\Users\user\AppData\Roaming\...\Luqkasd.exe, PE32 7->29 dropped 31 C:\Users\user\...\Luqkasd.exe:Zone.Identifier, ASCII 7->31 dropped 33 C:\Users\user\AppData\...\new order.exe.log, ASCII 7->33 dropped 45 Encrypted powershell cmdline option found 7->45 47 Writes to foreign memory regions 7->47 49 Injects a PE file into a foreign processes 7->49 15 InstallUtil.exe 6 7->15         started        19 powershell.exe 16 7->19         started        51 Multi AV Scanner detection for dropped file 11->51 53 Machine Learning detection for dropped file 11->53 21 powershell.exe 11 11->21         started        signatures5 process6 dnsIp7 35 146.70.76.43, 56281 TENET-1ZA United Kingdom 15->35 27 C:\Users\user\AppData\Roaming\...\run.dat, data 15->27 dropped 23 conhost.exe 19->23         started        25 conhost.exe 21->25         started        file8 process9

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            new order.exe32%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
            new order.exe35%VirustotalBrowse
            new order.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exe32%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
            SourceDetectionScannerLabelLinkDownload
            14.2.InstallUtil.exe.5e00000.6.unpack100%AviraTR/NanoCore.fadteDownload File
            14.0.InstallUtil.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File
            No Antivirus matches
            SourceDetectionScannerLabelLink
            0%Avira URL Cloudsafe
            http://james.newtonking.com/projects/json0%URL Reputationsafe
            http://ocsp.thawte.com00%URL Reputationsafe
            http://www.naver.com00%Avira URL Cloudsafe
            146.70.76.43100%Avira URL Cloudmalware
            No contacted domains info
            NameMaliciousAntivirus DetectionReputation
            true
            • Avira URL Cloud: safe
            low
            146.70.76.43true
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://www.newtonsoft.com/jsonnew order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.455076504.0000000003120000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.548140629.0000000004519000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.547142354.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.548137482.0000000004599000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.naver.com0new order.exe, Luqkasd.exe.0.drfalse
              • Avira URL Cloud: safe
              unknown
              https://www.nuget.org/packages/Newtonsoft.Json.Bsonnew order.exe, 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.455076504.0000000003120000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.471486860.0000000005780000.00000004.08000000.00040000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.529612367.0000000003473000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.547137071.00000000044F7000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://crl.thawte.com/ThawteTimestampingCA.crl0new order.exe, Luqkasd.exe.0.drfalse
                  high
                  https://api.telegram.org/botnew order.exe, 00000000.00000002.453841918.0000000003031000.00000004.00000800.00020000.00000000.sdmp, new order.exe, 00000000.00000002.457661334.00000000032A8000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.527779375.00000000033BB000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.527200680.0000000003371000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.533387647.00000000035B4000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 0000000F.00000002.527732524.00000000033B2000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.528679468.000000000347F000.00000004.00000800.00020000.00000000.sdmp, Luqkasd.exe, 00000010.00000002.527935405.000000000343B000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameInstallUtil.exe, 0000000E.00000002.527475187.0000000002D29000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://james.newtonking.com/projects/jsonLuqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ocsp.thawte.com0new order.exe, Luqkasd.exe.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://www.newtonsoft.com/jsonschemaLuqkasd.exe, 00000010.00000002.529846388.00000000034F5000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        146.70.76.43
                        unknownUnited Kingdom
                        2018TENET-1ZAtrue
                        Joe Sandbox Version:36.0.0 Rainbow Opal
                        Analysis ID:712322
                        Start date and time:2022-09-29 07:35:23 +02:00
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 10m 53s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:new order.exe
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:19
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.evad.winEXE@11/10@0/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HDC Information:Failed
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ctldl.windowsupdate.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report creation exceeded maximum time and may have missing disassembly code information.
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        TimeTypeDescription
                        07:36:47API Interceptor44x Sleep call for process: powershell.exe modified
                        07:37:51AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Luqkasd "C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exe"
                        07:38:00AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Luqkasd "C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exe"
                        07:38:06API Interceptor174x Sleep call for process: InstallUtil.exe modified
                        No context
                        No context
                        No context
                        No context
                        No context
                        Process:C:\Users\user\Desktop\new order.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:modified
                        Size (bytes):1039
                        Entropy (8bit):5.3436815157474165
                        Encrypted:false
                        SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhyE4KdE4KBLWE4K5AE4Kzr7a:MxHKXwYHKhQnoyHKdHKBqHK5AHKzva
                        MD5:6C24176D343957C767AA6536571797FA
                        SHA1:64512F67A49AF75E9A67474DF54FCCD3472905B2
                        SHA-256:63AB82B5B458425DB1E0831E1BB8CA642C602D9BCB0762A1E47C7836CACF3350
                        SHA-512:D0DFB30B723CC1F0ADB8D9448220AC67A1A21243499B7EB31402CAA0CE9F6A892073E10C52D132E59BF2321F05DBB0973B7E1026023992FC33DE5AB74A6979A4
                        Malicious:true
                        Reputation:moderate, very likely benign file
                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"System.Numerics, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\34957343ad5d84daee97a1affda91665\System.Runtime.Serialization.ni.dll",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b880
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):5829
                        Entropy (8bit):4.8968676994158
                        Encrypted:false
                        SSDEEP:96:WCJ2Woe5o2k6Lm5emmXIGvgyg12jDs+un/iQLEYFjDaeWJ6KGcmXx9smyFRLcU6f:5xoe5oVsm5emd0gkjDt4iWN3yBGHh9s6
                        MD5:36DE9155D6C265A1DE62A448F3B5B66E
                        SHA1:02D21946CBDD01860A0DE38D7EEC6CDE3A964FC3
                        SHA-256:8BA38D55AA8F1E4F959E7223FDF653ABB9BE5B8B5DE9D116604E1ABB371C1C87
                        SHA-512:C734ADE161FB89472B1DF9B9F062F4A53E7010D3FF99EDC0BD564540A56BC35743625C50A00635C31D165A74DCDBB330FFB878C5919D7B267F6F33D2AAB328E7
                        Malicious:false
                        Preview:PSMODULECACHE......<.e...Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........<.e...T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):16448
                        Entropy (8bit):5.551990926311433
                        Encrypted:false
                        SSDEEP:384:7Qte/Rq0GSP0xBun3ISBxn2uRRiJ9g2SJ3uzp1sYv:tPkBoY4x2uRp2cuVv
                        MD5:2A49B5586BCDEEEF2C02C25542EDF919
                        SHA1:5D379D96F470A651A8D0AB3FC1B53472D5562401
                        SHA-256:DA695E44D352095F10E2DDF1AFE4FED655008FD354AD949A0E8E8B8E7D6398E2
                        SHA-512:19CC7E7C44301A1E27D462CD8C698FAD8852AF2A8E5965CCFD2F4FDD646B15EFEA4CCB494D5456FBC1C1744B01EE3FA2A2707BB5799C0BB847747871A8BF3C93
                        Malicious:false
                        Preview:@...e...............................9.7..............@..........H...............<@.^.L."My...:'..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.............System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:very short file (no magic)
                        Category:dropped
                        Size (bytes):1
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3:U:U
                        MD5:C4CA4238A0B923820DCC509A6F75849B
                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                        Malicious:false
                        Preview:1
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:very short file (no magic)
                        Category:dropped
                        Size (bytes):1
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3:U:U
                        MD5:C4CA4238A0B923820DCC509A6F75849B
                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                        Malicious:false
                        Preview:1
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:very short file (no magic)
                        Category:dropped
                        Size (bytes):1
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3:U:U
                        MD5:C4CA4238A0B923820DCC509A6F75849B
                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                        Malicious:false
                        Preview:1
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:very short file (no magic)
                        Category:dropped
                        Size (bytes):1
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3:U:U
                        MD5:C4CA4238A0B923820DCC509A6F75849B
                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                        Malicious:false
                        Preview:1
                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):8
                        Entropy (8bit):3.0
                        Encrypted:false
                        SSDEEP:3:ddVl:ddVl
                        MD5:A66EC82C3FF14A24BEB60BCA681BB005
                        SHA1:00C5B9BA7A189EF2B13C666788B72081A2719BAB
                        SHA-256:A8E642B7C67C3DEC55C98E7AFC170A5E6017C2DC79A0FFF98B67FE52CAEFACBC
                        SHA-512:AA006579440262E0FE026413F4135D55316D3B248C147FD725FC996D47FFFF3E1033ABA2CC203D0193BF5F962EDFF29EC801112561378BC4BEF04370506B02CE
                        Malicious:true
                        Preview:...8(..H
                        Process:C:\Users\user\Desktop\new order.exe
                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Category:dropped
                        Size (bytes):952144
                        Entropy (8bit):7.695799414445227
                        Encrypted:false
                        SSDEEP:24576:q/hIikSs/wzknb6gT3wvFHANcvqpbInfDcvkCqvH:q/eNhYkbQvp8cNnbcsCqvH
                        MD5:450AA1D2AC8E10A3B8363FE2945462BD
                        SHA1:173275F693A10F8919C45DFB21F8035C7BC45FB6
                        SHA-256:316FF42588B6CF8C5A435EFB67D44D08A2D860BAB89612FC3E85EC6E9F4B4455
                        SHA-512:C3F95286F4BD09C87DD41ACB12C1279B0CF6A547FED73C7C073C21728503AE8FEC4974BDEC351B9049ACBB3A42F497A9731496073A39CCC6F08234F6DF20DC99
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 32%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j.................0.................. ........@.. ....................................@.................................H...O...................n..P...........,................................................ ............... ..H............text........ ...................... ..`.rsrc..............................@..@.reloc...............l..............@..B................|.......H........"...............................................................(....*b(....%.o....%o....o....*..(....*.0..+....... .........%.....(....(....%-.&...-.s....z.*..0..0........(....o....o....s...... ....o........,..o......*.........$........(....*.0..?.......(....t!...o.......+$.....r...po......o....&..(........X....i2.*..........-.......~....%-.&~..........s ...%.....s!...*B("...(....o#...*..0..:.......s$......+..~.....~.....i]....a.o%.....X....i2..o&...%-.&.*V('...r#..
                        Process:C:\Users\user\Desktop\new order.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):26
                        Entropy (8bit):3.95006375643621
                        Encrypted:false
                        SSDEEP:3:ggPYV:rPYV
                        MD5:187F488E27DB4AF347237FE461A079AD
                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                        Malicious:true
                        Preview:[ZoneTransfer]....ZoneId=0
                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):7.695799414445227
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                        • Win32 Executable (generic) a (10002005/4) 49.97%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        • DOS Executable Generic (2002/1) 0.01%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:new order.exe
                        File size:952144
                        MD5:450aa1d2ac8e10a3b8363fe2945462bd
                        SHA1:173275f693a10f8919c45dfb21f8035c7bc45fb6
                        SHA256:316ff42588b6cf8c5a435efb67d44d08a2d860bab89612fc3e85ec6e9f4b4455
                        SHA512:c3f95286f4bd09c87dd41acb12c1279b0cf6a547fed73c7c073c21728503ae8fec4974bdec351b9049acbb3a42f497a9731496073a39ccc6f08234f6df20dc99
                        SSDEEP:24576:q/hIikSs/wzknb6gT3wvFHANcvqpbInfDcvkCqvH:q/eNhYkbQvp8cNnbcsCqvH
                        TLSH:2315CED3794E0C81E4521935DDCFCA4F9AA5FACDBF9CF2D5A250C30E833B251A85A486
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j.................0.................. ........@.. ....................................@................................
                        Icon Hash:d8dcc4c4ccdc7cb4
                        Entrypoint:0x402e9a
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0xA395936A [Tue Dec 19 22:00:10 2056 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                        Signature Valid:false
                        Signature Issuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
                        Signature Validation Error:The digital signature of the object did not verify
                        Error Number:-2146869232
                        Not Before, Not After
                        • 8/21/2013 5:00:00 PM 8/22/2015 4:59:59 PM
                        Subject Chain
                        • CN=NAVER Corp., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=NAVER Corp., L=Seongnam-si, S=Gyeonggi-do, C=KR
                        Version:3
                        Thumbprint MD5:79BD3501D2B1064E8CD3559B4E2DB943
                        Thumbprint SHA-1:82543FBB1867D57DB13CE1BA7B6C39E115BE010A
                        Thumbprint SHA-256:C673653EE4392C9EF3C3F9373213069208EDC0795E53E5F93AEEB8F965CD1430
                        Serial:3ABBDAEE0F7C6B3F03437A3C166D7251
                        Instruction
                        jmp dword ptr [00402000h]
                        push es
                        cmp eax, ebp
                        insb
                        outsb
                        outsb
                        js 00007F08D0B4F1EDh
                        js 00007F08D0B4F20Fh
                        insd
                        xchg eax, ecx
                        xchg dword ptr [ebx+63h], ecx
                        shr byte ptr [ebp+ebp*2+6Eh], 00000078h
                        dec ebx
                        arpl word ptr [eax+2Ch], di
                        insd
                        outsb
                        js 00007F08D0B4F1EDh
                        arpl word ptr [eax+6Ch], di
                        insd
                        outsb
                        js 00007F08D0B4F1EDh
                        arpl word ptr [eax+6Ch], di
                        insd
                        outsb
                        js 00007F08D0B4F1EDh
                        arpl word ptr [eax+6Ch], di
                        insd
                        outsb
                        js 00007F08D0B4F1EDh
                        arpl word ptr [eax+6Ch], di
                        insd
                        outsb
                        js 00007F08D0B4F1EDh
                        arpl word ptr [eax+6Ch], di
                        in eax, dx
                        outsb
                        js 00007F08D0B4F1EDh
                        insd
                        salc
                        arpl word ptr [esi-34h], bp
                        inc edx
                        scasb
                        pop ecx
                        aam 6Ch
                        and dh, byte ptr [ebp+0510376Ah]
                        push ds
                        dec esi
                        or byte ptr [ecx], bh
                        or al, 1Fh
                        push ds
                        or al, 03h
                        pop eax
                        sub byte ptr [edx], al
                        push ss
                        add al, byte ptr [edx]
                        sbb bl, byte ptr [eax+29h]
                        push es
                        pop eax
                        push ds
                        sbb byte ptr [eax], al
                        pop eax
                        and cl, byte ptr [3D222858h]
                        pop eax
                        or al, 1Ch
                        or dword ptr [ebx+63h], eax
                        jne 00007F08D0B4F1E3h
                        inc edi
                        js 00007F08D0B4F20Eh
                        insd
                        outsb
                        js 00007F08D0B4F1EDh
                        arpl word ptr [eax], bp
                        sub dword ptr [ebp+6Eh], ebp
                        xor al, 4Ah
                        pushad
                        js 00007F08D0B4F152h
                        lea ebx, dword ptr [edx+1Bh]
                        dec ebx
                        arpl word ptr [eax+6Ch], di
                        insd
                        outsb
                        js 00007F08D0B4F1EDh
                        cmp dword ptr [eax+62h], 4Ch
                        jns 00007F08D0B4F1F0h
                        arpl word ptr [eax-26h], di
                        popad
                        outsb
                        js 00007F08D0B4F1EFh
                        arpl word ptr [eax+6Ch], di
                        insd
                        outsb
                        js 00007F08D0B4F203h
                        mov bh, 74h
                        insb
                        insd
                        dec esi
                        js 00007F08D0B4F1EDh
                        arpl word ptr [eax+786E6D60h], bx
                        or esp, dword ptr [ebx+78h]
                        dec esp
                        insd
                        outsb
                        js 00007F08D0B4F1EBh
                        arpl word ptr [eax+68h], di
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x2e480x4f.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd00000x19aec.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0xe6e000x1950.rsrc
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xea0000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x2e2c0x1c.text
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000xccca00xcce00False0.8712570069402075data7.858504462208288IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rsrc0xd00000x19aec0x19c00False0.07720532463592233data3.339326632349292IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0xea0000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountry
                        RT_ICON0xd01a00xe02PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                        RT_ICON0xd0fb40x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m
                        RT_ICON0xd142c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m
                        RT_ICON0xd39e40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m
                        RT_ICON0xd4a9c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/m
                        RT_ICON0xe52d40x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m
                        RT_GROUP_ICON0xe950c0x5adata
                        RT_VERSION0xe95780x372data
                        RT_MANIFEST0xe98fc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                        DLLImport
                        mscoree.dll_CorExeMain
                        TimestampSource PortDest PortSource IPDest IP
                        Sep 29, 2022 07:38:10.310127020 CEST4970756281192.168.2.7146.70.76.43
                        Sep 29, 2022 07:38:13.388246059 CEST4970756281192.168.2.7146.70.76.43
                        Sep 29, 2022 07:38:19.470930099 CEST4970756281192.168.2.7146.70.76.43
                        Sep 29, 2022 07:38:30.191234112 CEST4970856281192.168.2.7146.70.76.43
                        Sep 29, 2022 07:38:33.270181894 CEST4970856281192.168.2.7146.70.76.43
                        Sep 29, 2022 07:38:39.269511938 CEST4970856281192.168.2.7146.70.76.43

                        Click to jump to process

                        Target ID:0
                        Start time:07:36:24
                        Start date:29/09/2022
                        Path:C:\Users\user\Desktop\new order.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\new order.exe"
                        Imagebase:0xbb0000
                        File size:952144 bytes
                        MD5 hash:450AA1D2AC8E10A3B8363FE2945462BD
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.466623981.000000000427E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.466623981.000000000427E000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.466623981.000000000427E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.453841918.0000000003031000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000003.255565605.0000000004056000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.467477543.0000000005570000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.464712592.00000000040FB000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.466145560.00000000041DD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.466145560.00000000041DD000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.466145560.00000000041DD000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.457661334.00000000032A8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000003.257014991.00000000042E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low

                        Target ID:1
                        Start time:07:36:37
                        Start date:29/09/2022
                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA==
                        Imagebase:0xe60000
                        File size:430592 bytes
                        MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Reputation:high

                        Target ID:2
                        Start time:07:36:37
                        Start date:29/09/2022
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6edaf0000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Target ID:14
                        Start time:07:37:58
                        Start date:29/09/2022
                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                        Imagebase:0x850000
                        File size:41064 bytes
                        MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000000.450018784.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 0000000E.00000000.450018784.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000000.450018784.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.538529652.0000000005E00000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.527475187.0000000002D29000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.533662558.0000000003D29000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.533662558.0000000003D29000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.533662558.0000000003D29000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.538073119.0000000005660000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000E.00000002.538073119.0000000005660000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000E.00000002.538073119.0000000005660000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.538073119.0000000005660000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                        Reputation:high

                        Target ID:15
                        Start time:07:38:00
                        Start date:29/09/2022
                        Path:C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exe"
                        Imagebase:0xfe0000
                        File size:952144 bytes
                        MD5 hash:450AA1D2AC8E10A3B8363FE2945462BD
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000F.00000002.527779375.00000000033BB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000F.00000002.527200680.0000000003371000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000F.00000002.527732524.00000000033B2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000F.00000002.533387647.00000000035B4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        Antivirus matches:
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 32%, ReversingLabs
                        Reputation:low

                        Target ID:16
                        Start time:07:38:08
                        Start date:29/09/2022
                        Path:C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Roaming\Znxqmfqxv\Luqkasd.exe"
                        Imagebase:0xf20000
                        File size:952144 bytes
                        MD5 hash:450AA1D2AC8E10A3B8363FE2945462BD
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000010.00000002.528679468.000000000347F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000010.00000002.527935405.000000000343B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low

                        Target ID:17
                        Start time:07:38:25
                        Start date:29/09/2022
                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAwAA==
                        Imagebase:0xe60000
                        File size:430592 bytes
                        MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:.Net C# or VB.NET
                        Reputation:high

                        Target ID:18
                        Start time:07:38:25
                        Start date:29/09/2022
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6edaf0000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high

                        No disassembly