Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe

Overview

General Information

Sample Name:Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
Analysis ID:796996
MD5:e587236cb6e5ccf2497ab08b245f724f
SHA1:8b9f158fd574c4e982ec73e2368ebb4f6e4b566b
SHA256:249a4af8064c560426fc8aea6fc23ee47a24ba800628d805f9eb0653b8e1d4f9
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Machine Learning detection for sample
.NET source code contains potential unpacker
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe (PID: 5044 cmdline: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe MD5: E587236CB6E5CCF2497AB08B245F724F)
    • schtasks.exe (PID: 2472 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2F6A.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4956 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 4852 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp315F.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 2148 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: E587236CB6E5CCF2497AB08B245F724F)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Group": "KUWAIT", "Domain1": "doc4.ddns.net", "Domain2": "donald30m.gleeze.com", "Port": 9497, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0x1018d:$x1: NanoCore.ClientPluginHost
  • 0x101ca:$x2: IClientNetworkHost
  • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
  • 0xff05:$x1: NanoCore Client.exe
  • 0x1018d:$x2: NanoCore.ClientPluginHost
  • 0x117c6:$s1: PluginCommand
  • 0x117ba:$s2: FileCommand
  • 0x1266b:$s3: PipeExists
  • 0x18422:$s4: PipeCreated
  • 0x101b7:$s5: IClientLoggingHost
Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0xfef5:$x1: NanoCore Client
    • 0xff05:$x1: NanoCore Client
    • 0x1014d:$x2: NanoCore.ClientPlugin
    • 0x1018d:$x3: NanoCore.ClientPluginHost
    • 0x10142:$i1: IClientApp
    • 0x10163:$i2: IClientData
    • 0x1016f:$i3: IClientNetwork
    • 0x1017e:$i4: IClientAppHost
    • 0x101a7:$i5: IClientDataHost
    • 0x101b7:$i6: IClientLoggingHost
    • 0x101ca:$i7: IClientNetworkHost
    • 0x101dd:$i8: IClientUIHost
    • 0x101eb:$i9: IClientNameObjectCollection
    • 0x10207:$i10: IClientReadOnlyNameObjectCollection
    • 0xff54:$s1: ClientPlugin
    • 0x10156:$s1: ClientPlugin
    • 0x1064a:$s2: EndPoint
    • 0x10653:$s3: IPAddress
    • 0x1065d:$s4: IPEndPoint
    • 0x12093:$s6: get_ClientSettings
    • 0x12637:$s7: get_Connected
    Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfef5:$a: NanoCore
    • 0xff05:$a: NanoCore
    • 0x10139:$a: NanoCore
    • 0x1014d:$a: NanoCore
    • 0x1018d:$a: NanoCore
    • 0xff54:$b: ClientPlugin
    • 0x10156:$b: ClientPlugin
    • 0x10196:$b: ClientPlugin
    • 0x1007b:$c: ProjectData
    • 0x10a82:$d: DESCrypto
    • 0x1844e:$e: KeepAlive
    • 0x1643c:$g: LogClientMessage
    • 0x12637:$i: get_Connected
    • 0x10db8:$j: #=q
    • 0x10de8:$j: #=q
    • 0x10e04:$j: #=q
    • 0x10e34:$j: #=q
    • 0x10e50:$j: #=q
    • 0x10e6c:$j: #=q
    • 0x10e9c:$j: #=q
    • 0x10eb8:$j: #=q
    Click to see the 1 entries
    SourceRuleDescriptionAuthorStrings
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
    • 0xff05:$x1: NanoCore Client.exe
    • 0x1018d:$x2: NanoCore.ClientPluginHost
    • 0x117c6:$s1: PluginCommand
    • 0x117ba:$s2: FileCommand
    • 0x1266b:$s3: PipeExists
    • 0x18422:$s4: PipeCreated
    • 0x101b7:$s5: IClientLoggingHost
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xfef5:$x1: NanoCore Client
      • 0xff05:$x1: NanoCore Client
      • 0x1014d:$x2: NanoCore.ClientPlugin
      • 0x1018d:$x3: NanoCore.ClientPluginHost
      • 0x10142:$i1: IClientApp
      • 0x10163:$i2: IClientData
      • 0x1016f:$i3: IClientNetwork
      • 0x1017e:$i4: IClientAppHost
      • 0x101a7:$i5: IClientDataHost
      • 0x101b7:$i6: IClientLoggingHost
      • 0x101ca:$i7: IClientNetworkHost
      • 0x101dd:$i8: IClientUIHost
      • 0x101eb:$i9: IClientNameObjectCollection
      • 0x10207:$i10: IClientReadOnlyNameObjectCollection
      • 0xff54:$s1: ClientPlugin
      • 0x10156:$s1: ClientPlugin
      • 0x1064a:$s2: EndPoint
      • 0x10653:$s3: IPAddress
      • 0x1065d:$s4: IPEndPoint
      • 0x12093:$s6: get_ClientSettings
      • 0x12637:$s7: get_Connected
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x1007b:$c: ProjectData
      • 0x10a82:$d: DESCrypto
      • 0x1844e:$e: KeepAlive
      • 0x1643c:$g: LogClientMessage
      • 0x12637:$i: get_Connected
      • 0x10db8:$j: #=q
      • 0x10de8:$j: #=q
      • 0x10e04:$j: #=q
      • 0x10e34:$j: #=q
      • 0x10e50:$j: #=q
      • 0x10e6c:$j: #=q
      • 0x10e9c:$j: #=q
      • 0x10eb8:$j: #=q
      Click to see the 1 entries
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
      • 0xff8d:$x1: NanoCore.ClientPluginHost
      • 0xffca:$x2: IClientNetworkHost
      • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfcf5:$a: NanoCore
        • 0xfd05:$a: NanoCore
        • 0xff39:$a: NanoCore
        • 0xff4d:$a: NanoCore
        • 0xff8d:$a: NanoCore
        • 0xfd54:$b: ClientPlugin
        • 0xff56:$b: ClientPlugin
        • 0xff96:$b: ClientPlugin
        • 0xfe7b:$c: ProjectData
        • 0x10882:$d: DESCrypto
        • 0x1824e:$e: KeepAlive
        • 0x1623c:$g: LogClientMessage
        • 0x12437:$i: get_Connected
        • 0x10bb8:$j: #=q
        • 0x10be8:$j: #=q
        • 0x10c04:$j: #=q
        • 0x10c34:$j: #=q
        • 0x10c50:$j: #=q
        • 0x10c6c:$j: #=q
        • 0x10c9c:$j: #=q
        • 0x10cb8:$j: #=q
        00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
        • 0xff8d:$a1: NanoCore.ClientPluginHost
        • 0xff4d:$a2: NanoCore.ClientPlugin
        • 0x11ea6:$b1: get_BuilderSettings
        • 0xfda9:$b2: ClientLoaderForm.resources
        • 0x115c6:$b3: PluginCommand
        • 0xff7e:$b4: IClientAppHost
        • 0x1a3fe:$b5: GetBlockHash
        • 0x124fe:$b6: AddHostEntry
        • 0x161f1:$b7: LogClientException
        • 0x1246b:$b8: PipeExists
        • 0xffb7:$b9: IClientLoggingHost
        00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
        • 0xf7ad:$x1: NanoCore.ClientPluginHost
        • 0xf7da:$x2: IClientNetworkHost
        Click to see the 28 entries
        SourceRuleDescriptionAuthorStrings
        5.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2af3f10.0.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        5.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2af3f10.0.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        5.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2af3f10.0.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
        • 0xe38:$x2: NanoCore.ClientPlugin
        • 0xe75:$x3: NanoCore.ClientPluginHost
        • 0xe5a:$i1: IClientApp
        • 0xe4e:$i2: IClientData
        • 0xe29:$i3: IClientNetwork
        • 0xec3:$i4: IClientAppHost
        • 0xe65:$i5: IClientDataHost
        • 0xeb0:$i6: IClientLoggingHost
        • 0xe8f:$i7: IClientNetworkHost
        • 0xea2:$i8: IClientUIHost
        • 0xed2:$i9: IClientNameObjectCollection
        • 0xef7:$i10: IClientReadOnlyNameObjectCollection
        • 0xe41:$s1: ClientPlugin
        • 0x177c:$s1: ClientPlugin
        • 0x1789:$s1: ClientPlugin
        • 0x11f9:$s6: get_ClientSettings
        • 0x1249:$s7: get_Connected
        5.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2af3f10.0.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
        • 0xe75:$a1: NanoCore.ClientPluginHost
        • 0xe38:$a2: NanoCore.ClientPlugin
        • 0x120c:$b1: get_BuilderSettings
        • 0xec3:$b4: IClientAppHost
        • 0x127d:$b6: AddHostEntry
        • 0x12ec:$b7: LogClientException
        • 0x1261:$b8: PipeExists
        • 0xeb0:$b9: IClientLoggingHost
        6.2.dhcpmon.exe.3483dc4.0.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        Click to see the 53 entries

        AV Detection

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, ProcessId: 5044, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, ProcessId: 5044, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Persistence and Installation Behavior

        barindex
        Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2F6A.tmp, CommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2F6A.tmp, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, ParentImage: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, ParentProcessId: 5044, ParentProcessName: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, ProcessCommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2F6A.tmp, ProcessId: 2472, ProcessName: schtasks.exe

        Stealing of Sensitive Information

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, ProcessId: 5044, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, ProcessId: 5044, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Timestamp:192.168.2.5216.218.135.1184970494972025019 02/02/23-13:52:37.416548
        SID:2025019
        Source Port:49704
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184971494972025019 02/02/23-13:53:43.248786
        SID:2025019
        Source Port:49714
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184970494972816718 02/02/23-13:52:37.610379
        SID:2816718
        Source Port:49704
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184971994972816766 02/02/23-13:54:17.287135
        SID:2816766
        Source Port:49719
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184970794972025019 02/02/23-13:53:11.027058
        SID:2025019
        Source Port:49707
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184970694972816766 02/02/23-13:53:06.659044
        SID:2816766
        Source Port:49706
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184971694972816766 02/02/23-13:53:51.482545
        SID:2816766
        Source Port:49716
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184971894972816766 02/02/23-13:54:10.762374
        SID:2816766
        Source Port:49718
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184971394972816718 02/02/23-13:53:38.638029
        SID:2816718
        Source Port:49713
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184970594972816766 02/02/23-13:52:47.006733
        SID:2816766
        Source Port:49705
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184971694972025019 02/02/23-13:53:49.540253
        SID:2025019
        Source Port:49716
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184970694972025019 02/02/23-13:53:04.914468
        SID:2025019
        Source Port:49706
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184970994972816766 02/02/23-13:53:19.141097
        SID:2816766
        Source Port:49709
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184971994972025019 02/02/23-13:54:15.331062
        SID:2025019
        Source Port:49719
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184970494972816766 02/02/23-13:52:39.164512
        SID:2816766
        Source Port:49704
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184970394972025019 02/02/23-13:52:31.077436
        SID:2025019
        Source Port:49703
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184970994972025019 02/02/23-13:53:17.202283
        SID:2025019
        Source Port:49709
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184972094972816766 02/02/23-13:54:23.957947
        SID:2816766
        Source Port:49720
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184970594972025019 02/02/23-13:52:43.940467
        SID:2025019
        Source Port:49705
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184971494972816766 02/02/23-13:53:44.997752
        SID:2816766
        Source Port:49714
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184971394972025019 02/02/23-13:53:36.615923
        SID:2025019
        Source Port:49713
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184970394972816766 02/02/23-13:52:32.924340
        SID:2816766
        Source Port:49703
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184971894972025019 02/02/23-13:54:08.817214
        SID:2025019
        Source Port:49718
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184972094972025019 02/02/23-13:54:21.603489
        SID:2025019
        Source Port:49720
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184970794972816766 02/02/23-13:53:12.773010
        SID:2816766
        Source Port:49707
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.5216.218.135.1184971394972816766 02/02/23-13:53:38.843314
        SID:2816766
        Source Port:49713
        Destination Port:9497
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeReversingLabs: Detection: 97%
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeVirustotal: Detection: 77%Perma Link
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeAvira: detected
        Source: doc4.ddns.netAvira URL Cloud: Label: malware
        Source: donald30m.gleeze.comAvira URL Cloud: Label: malware
        Source: doc4.ddns.netVirustotal: Detection: 8%Perma Link
        Source: doc4.ddns.netVirustotal: Detection: 8%Perma Link
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeAvira: detection malicious, Label: TR/Dropper.Gen
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 97%
        Source: Yara matchFile source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, type: SAMPLE
        Source: Yara matchFile source: 6.2.dhcpmon.exe.44aeaf4.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.dhcpmon.exe.44b311d.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.dhcpmon.exe.44a9cbe.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.dhcpmon.exe.44aeaf4.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c4629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.333152349.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.332991768.0000000003461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.333232507.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 5044, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 1244, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2148, type: MEMORYSTR
        Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeJoe Sandbox ML: detected
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.unpackAvira: Label: TR/NanoCore.fadte
        Source: 00000006.00000002.333152349.0000000004461000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Group": "KUWAIT", "Domain1": "doc4.ddns.net", "Domain2": "donald30m.gleeze.com", "Port": 9497, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: Binary string: System.pdbC source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579573145.00000000025F5000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\Windows\symbols\dll\System.pdb=C source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579573145.00000000025F5000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: indows\System.pdbpdbtem.pdbog source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579573145.00000000025F5000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\Windows\dll\System.pdbso source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579573145.00000000025F5000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\Windows\System.pdbot88 source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579573145.00000000025F5000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb;C: source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579573145.00000000025F5000.00000004.00000020.00020000.00000000.sdmp

        Networking

        barindex
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49703 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49703 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49704 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49704 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.5:49704 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49705 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49705 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49706 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49706 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49707 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49707 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49709 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49709 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49713 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49713 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.5:49713 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49714 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49714 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49716 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49716 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49718 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49718 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49719 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49719 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49720 -> 216.218.135.118:9497
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49720 -> 216.218.135.118:9497
        Source: Malware configuration extractorURLs: doc4.ddns.net
        Source: Malware configuration extractorURLs: donald30m.gleeze.com
        Source: unknownDNS query: name: doc4.ddns.net
        Source: Joe Sandbox ViewASN Name: HURRICANEUS HURRICANEUS
        Source: global trafficTCP traffic: 192.168.2.5:49703 -> 216.218.135.118:9497
        Source: unknownDNS traffic detected: queries for: doc4.ddns.net
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 0_2_02632D56 WSARecv,
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, type: SAMPLE
        Source: Yara matchFile source: 6.2.dhcpmon.exe.44aeaf4.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.dhcpmon.exe.44b311d.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.dhcpmon.exe.44a9cbe.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.dhcpmon.exe.44aeaf4.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c4629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.333152349.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.332991768.0000000003461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.333232507.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 5044, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 1244, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2148, type: MEMORYSTR
        Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED

        System Summary

        barindex
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, type: SAMPLEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, type: SAMPLEMatched rule: Detects NanoCore Author: ditekSHen
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, type: SAMPLEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, type: SAMPLEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 5.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2af3f10.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 5.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2af3f10.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 5.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2af3f10.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 6.2.dhcpmon.exe.3483dc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 6.2.dhcpmon.exe.3483dc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.2.dhcpmon.exe.3483dc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.4ca0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.4ca0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.4ca0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 6.2.dhcpmon.exe.44aeaf4.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 6.2.dhcpmon.exe.44aeaf4.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.2.dhcpmon.exe.44aeaf4.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 6.2.dhcpmon.exe.44b311d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 6.2.dhcpmon.exe.44b311d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.2.dhcpmon.exe.44b311d.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 6.2.dhcpmon.exe.44a9cbe.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 6.2.dhcpmon.exe.44a9cbe.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.2.dhcpmon.exe.44a9cbe.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.dhcpmon.exe.44a9cbe.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 6.2.dhcpmon.exe.44aeaf4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 6.2.dhcpmon.exe.44aeaf4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 6.2.dhcpmon.exe.44aeaf4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.29c180c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.29c180c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.29c180c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000000.00000002.584012735.0000000004CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 00000000.00000002.584012735.0000000004CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000000.00000002.584012735.0000000004CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000000.00000002.579767237.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000006.00000002.333152349.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.333152349.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000006.00000002.332991768.0000000003461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.332991768.0000000003461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000005.00000002.333232507.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.333232507.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 5044, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 5044, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 5044, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 1244, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 1244, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: dhcpmon.exe PID: 2148, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 2148, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Detects NanoCore Author: ditekSHen
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, type: SAMPLEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, type: SAMPLEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, type: SAMPLEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, type: SAMPLEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, type: SAMPLEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 5.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2af3f10.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 5.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2af3f10.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 5.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2af3f10.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 5.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2af3f10.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 6.2.dhcpmon.exe.3483dc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.dhcpmon.exe.3483dc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.dhcpmon.exe.3483dc4.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.2.dhcpmon.exe.3483dc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.4ca0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.4ca0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.4ca0000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.4ca0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 6.2.dhcpmon.exe.44aeaf4.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.dhcpmon.exe.44aeaf4.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.dhcpmon.exe.44aeaf4.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.2.dhcpmon.exe.44aeaf4.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 6.2.dhcpmon.exe.44b311d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.dhcpmon.exe.44b311d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.dhcpmon.exe.44b311d.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.2.dhcpmon.exe.44b311d.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 6.2.dhcpmon.exe.44a9cbe.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.dhcpmon.exe.44a9cbe.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.dhcpmon.exe.44a9cbe.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.2.dhcpmon.exe.44a9cbe.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.dhcpmon.exe.44a9cbe.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 6.2.dhcpmon.exe.44aeaf4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.dhcpmon.exe.44aeaf4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 6.2.dhcpmon.exe.44aeaf4.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 6.2.dhcpmon.exe.44aeaf4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c4629.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.29c180c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.29c180c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.29c180c.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.29c180c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000000.00000002.584012735.0000000004CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000002.584012735.0000000004CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000002.584012735.0000000004CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000000.00000002.584012735.0000000004CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000000.00000002.579767237.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000006.00000002.333152349.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.333152349.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000006.00000002.332991768.0000000003461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.332991768.0000000003461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000005.00000002.333232507.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.333232507.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 5044, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 5044, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 5044, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 1244, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 1244, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: dhcpmon.exe PID: 2148, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 2148, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 0_2_025C2FA8
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 0_2_025C23A0
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 0_2_025CB0E8
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 0_2_025C89D8
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 0_2_025C969F
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 0_2_025C306F
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 0_2_025C95D8
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 5_2_04CB2FA8
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 5_2_04CB23A0
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 5_2_04CB3850
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 5_2_04CB306F
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_03053850
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_030523A0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_03052FA8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_0305306F
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 0_2_026332A2 NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 0_2_02633267 NtQuerySystemInformation,
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579767237.00000000029B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.582564079.0000000003A30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.584012735.0000000004CA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.582564079.0000000003A17000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.584163086.0000000004D00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000005.00000002.333386171.0000000003B37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000005.00000002.333386171.0000000003B4F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000005.00000002.333232507.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000005.00000002.333232507.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeStatic PE information: Section: .elo ZLIB complexity 1.0003107244318181
        Source: dhcpmon.exe.0.drStatic PE information: Section: .elo ZLIB complexity 1.0003107244318181
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeReversingLabs: Detection: 97%
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeVirustotal: Detection: 77%
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeFile read: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeJump to behavior
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2F6A.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp315F.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2F6A.tmp
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp315F.tmp
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 0_2_02633062 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 0_2_0263302B AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeFile created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9AJump to behavior
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeFile created: C:\Users\user\AppData\Local\Temp\tmp2F6A.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@9/8@45/1
        Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4964:120:WilError_01
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{855e9a7d-1ad2-4bc4-b60a-70df78045d33}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4956:120:WilError_01
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: dhcpmon.exe.0.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: dhcpmon.exe.0.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: Binary string: System.pdbC source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579573145.00000000025F5000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\Windows\symbols\dll\System.pdb=C source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579573145.00000000025F5000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: indows\System.pdbpdbtem.pdbog source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579573145.00000000025F5000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\Windows\dll\System.pdbso source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579573145.00000000025F5000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\Windows\System.pdbot88 source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579573145.00000000025F5000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb;C: source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579573145.00000000025F5000.00000004.00000020.00020000.00000000.sdmp

        Data Obfuscation

        barindex
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: dhcpmon.exe.0.dr, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeStatic PE information: section name: .elo
        Source: dhcpmon.exe.0.drStatic PE information: section name: .elo
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeStatic PE information: 0x9E5E3975 [Fri Mar 13 00:40:21 2054 UTC]
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: dhcpmon.exe.0.dr, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: dhcpmon.exe.0.dr, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2F6A.tmp

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeFile opened: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe TID: 1544Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe TID: 1364Thread sleep time: -520000s >= -30000s
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe TID: 5708Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4668Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeWindow / User API: foregroundWindowGot 1016
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 0_2_0263169A GetSystemInfo,
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000003.522188308.0000000000976000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000003.522188308.0000000000976000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeMemory allocated: page read and write | page guard
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2F6A.tmp
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp315F.tmp
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000003.441306666.0000000000991000.00000004.00000020.00020000.00000000.sdmp, Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579767237.0000000002A98000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579767237.0000000002A98000.00000004.00000800.00020000.00000000.sdmp, Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579767237.0000000002A3E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerp
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000003.441306666.0000000000991000.00000004.00000020.00020000.00000000.sdmp, Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000003.541248480.0000000000993000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerknown.
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, type: SAMPLE
        Source: Yara matchFile source: 6.2.dhcpmon.exe.44aeaf4.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.dhcpmon.exe.44b311d.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.dhcpmon.exe.44a9cbe.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.dhcpmon.exe.44aeaf4.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c4629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.333152349.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.332991768.0000000003461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.333232507.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 5044, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 1244, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2148, type: MEMORYSTR
        Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED

        Remote Access Functionality

        barindex
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579767237.00000000029B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.579767237.00000000029B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.584012735.0000000004CA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000000.00000002.584012735.0000000004CA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000005.00000002.333232507.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, 00000005.00000002.333232507.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 00000006.00000002.333152349.0000000004461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000006.00000002.333152349.0000000004461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 00000006.00000002.332991768.0000000003461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000006.00000002.332991768.0000000003461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe.0.drString found in binary or memory: NanoCore.ClientPluginHost
        Source: Yara matchFile source: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe, type: SAMPLE
        Source: Yara matchFile source: 6.2.dhcpmon.exe.44aeaf4.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.dhcpmon.exe.44b311d.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.dhcpmon.exe.44a9cbe.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.dhcpmon.exe.44aeaf4.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c4629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.333152349.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.332991768.0000000003461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.333232507.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 5044, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe PID: 1244, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2148, type: MEMORYSTR
        Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 0_2_0263289A bind,
        Source: C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exeCode function: 0_2_02632848 bind,
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Scheduled Task/Job
        1
        Scheduled Task/Job
        1
        Access Token Manipulation
        2
        Masquerading
        11
        Input Capture
        11
        Security Software Discovery
        Remote Services11
        Input Capture
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts12
        Process Injection
        1
        Disable or Modify Tools
        LSASS Memory2
        Process Discovery
        Remote Desktop Protocol11
        Archive Collected Data
        Exfiltration Over Bluetooth1
        Non-Standard Port
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)1
        Scheduled Task/Job
        21
        Virtualization/Sandbox Evasion
        Security Account Manager21
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
        Remote Access Software
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
        Access Token Manipulation
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureScheduled Transfer1
        Ingress Tool Transfer
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script12
        Process Injection
        LSA Secrets1
        Remote System Discovery
        SSHKeyloggingData Transfer Size Limits1
        Non-Application Layer Protocol
        Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common1
        Deobfuscate/Decode Files or Information
        Cached Domain Credentials3
        System Information Discovery
        VNCGUI Input CaptureExfiltration Over C2 Channel21
        Application Layer Protocol
        Jamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup Items1
        Hidden Files and Directories
        DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
        Software Packing
        Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
        Timestomp
        /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 796996 Sample: Trojan.MSIL.Agent.fpar-249a... Startdate: 02/02/2023 Architecture: WINDOWS Score: 100 35 donald30m.gleeze.com 2->35 41 Snort IDS alert for network traffic 2->41 43 Multi AV Scanner detection for domain / URL 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 14 other signatures 2->47 8 Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe 1 14 2->8         started        13 Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe 3 2->13         started        15 dhcpmon.exe 3 2->15         started        signatures3 process4 dnsIp5 37 doc4.ddns.net 216.218.135.118, 49703, 49704, 49705 HURRICANEUS United States 8->37 39 donald30m.gleeze.com 8->39 25 C:\Program Files (x86)\...\dhcpmon.exe, PE32 8->25 dropped 27 C:\Users\user\AppData\Roaming\...\run.dat, data 8->27 dropped 29 C:\Users\user\AppData\Local\...\tmp2F6A.tmp, XML 8->29 dropped 31 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 8->31 dropped 49 Uses schtasks.exe or at.exe to add and modify task schedules 8->49 51 Hides that the sample has been downloaded from the Internet (zone.identifier) 8->51 17 schtasks.exe 1 8->17         started        19 schtasks.exe 1 8->19         started        33 Trojan.MSIL.Agent....c560426fc8a.exe.log, ASCII 13->33 dropped file6 signatures7 process8 process9 21 conhost.exe 17->21         started        23 conhost.exe 19->23         started       

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe97%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
        Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe77%VirustotalBrowse
        Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe100%AviraTR/Dropper.Gen
        Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%AviraTR/Dropper.Gen
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe97%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
        SourceDetectionScannerLabelLinkDownload
        0.0.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.2f0000.0.unpack100%AviraHEUR/AGEN.1208316Download File
        0.2.Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe.55c0000.6.unpack100%AviraTR/NanoCore.fadteDownload File
        SourceDetectionScannerLabelLink
        doc4.ddns.net9%VirustotalBrowse
        donald30m.gleeze.com3%VirustotalBrowse
        SourceDetectionScannerLabelLink
        doc4.ddns.net100%Avira URL Cloudmalware
        donald30m.gleeze.com100%Avira URL Cloudmalware
        doc4.ddns.net9%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        doc4.ddns.net
        216.218.135.118
        truetrueunknown
        donald30m.gleeze.com
        unknown
        unknowntrueunknown
        NameMaliciousAntivirus DetectionReputation
        doc4.ddns.nettrue
        • 9%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        donald30m.gleeze.comtrue
        • Avira URL Cloud: malware
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        216.218.135.118
        doc4.ddns.netUnited States
        6939HURRICANEUStrue
        Joe Sandbox Version:36.0.0 Rainbow Opal
        Analysis ID:796996
        Start date and time:2023-02-02 13:51:27 +01:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 7m 48s
        Hypervisor based Inspection enabled:false
        Report type:light
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:10
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample file name:Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@9/8@45/1
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
        • TCP Packets have been reduced to 100
        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ctldl.windowsupdate.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        • Report size getting too big, too many NtDeviceIoControlFile calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        13:52:29API Interceptor899x Sleep call for process: Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe modified
        13:52:31Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe" s>$(Arg0)
        13:52:31Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
        13:52:32AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        No context
        No context
        No context
        No context
        No context
        Process:C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Category:dropped
        Size (bytes):208192
        Entropy (8bit):7.452519436311911
        Encrypted:false
        SSDEEP:6144:nLV6Bta6dtJmakIM57s7UBmOKqVotp/wK328:nLV6BtpmkBQmGuAK328
        MD5:E587236CB6E5CCF2497AB08B245F724F
        SHA1:8B9F158FD574C4E982EC73E2368EBB4F6E4B566B
        SHA-256:249A4AF8064C560426FC8AEA6FC23EE47A24BA800628D805F9EB0653B8E1D4F9
        SHA-512:79BDF02544E533312D2BD9D5D899690A59E2713F6958210E30B8A41699B7752EE8EE939C4FCACFC5E57A1E22BE21F228BFDEC5990D24C1D23D403F65383B0CAD
        Malicious:true
        Yara Hits:
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth (Nextron Systems)
        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth (Nextron Systems)
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Joe Security
        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: ditekSHen
        • Rule: NanoCore, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: unknown
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        • Antivirus: Joe Sandbox ML, Detection: 100%
        • Antivirus: ReversingLabs, Detection: 97%
        Reputation:low
        Preview:MZ......................@.............................................m..:.^r.V.is program cannot be run in DOS mode....$.......PE..L...u9^..x8.................b........... ........@.. .................................... .................................8...W.... ..._........................................................................... ............... ..H............text........ ...................... ..`.reloc..............................@..B.elo....._... ...`..................@..@................t.......H...........T............................................................0..Q........o5.......*.o6....-.&......3+..+.... ....3......1..... 2.... ....3.... .......*.*....0..E.......s7....-(&s8....-&&s9....,$&s:........s;........*.....+.....+.....+.....0..........~....o<...*..0..........~....o=...*..0..........~....o>...*..0..........~....o?...*..0..........~....o@...*..0.............-.&(A...*&+...0..$.......~B........-.(...+.-.&+..B...+.~B...*.0.............-.&(A...*&+...0..
        Process:C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):26
        Entropy (8bit):3.95006375643621
        Encrypted:false
        SSDEEP:3:ggPYV:rPYV
        MD5:187F488E27DB4AF347237FE461A079AD
        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
        Malicious:true
        Preview:[ZoneTransfer]....ZoneId=0
        Process:C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):525
        Entropy (8bit):5.2874233355119316
        Encrypted:false
        SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
        MD5:61CCF53571C9ABA6511D696CB0D32E45
        SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
        SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
        SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
        Malicious:true
        Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
        Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):525
        Entropy (8bit):5.2874233355119316
        Encrypted:false
        SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
        MD5:61CCF53571C9ABA6511D696CB0D32E45
        SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
        SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
        SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
        Malicious:false
        Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
        Process:C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):1336
        Entropy (8bit):5.155039726320282
        Encrypted:false
        SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0PuL+mGIaxtn:cbk4oL600QydbQxIYODOLedq3S88j
        MD5:48F81422D81C15F6FEB04712FA462929
        SHA1:54B98A94C873D79855E2806FCE3BF7595BDDAB36
        SHA-256:77322090BB966A60FB35A96818844E8EEC195EDE49506403FD30D13315CF384E
        SHA-512:28F72799A3867282529E38141BC4FB454C6843D3DC8DED4D9384A7B186A7B9E54F83D28DDF95EF92D92D6E51AB687A928BFD7A3641E0BF353B48BFC4A6D92A5D
        Malicious:true
        Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
        Process:C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:modified
        Size (bytes):1310
        Entropy (8bit):5.109425792877704
        Encrypted:false
        SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
        MD5:5C2F41CFC6F988C859DA7D727AC2B62A
        SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
        SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
        SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
        Malicious:false
        Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
        Process:C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        File Type:data
        Category:dropped
        Size (bytes):8
        Entropy (8bit):3.0
        Encrypted:false
        SSDEEP:3:eQh7t:eQZt
        MD5:3CBD21D820A416CE1F45D62B147FA3CD
        SHA1:51CDCBD1B4B1483FAD4341D6FA7344F7012A7E5D
        SHA-256:1998F131D77CE0373D863042818B8A524A2A8336C8CB089D80287402E7A42B47
        SHA-512:FDEF9C4C21C8B53BAC3EA192C0EB48786EC39EABFC3105F87C735B0F07D6124B52EB710652AF5E2A1F8393928D760644018FB4D7E78BA2A3AEAD769FB0823323
        Malicious:true
        Preview:.n5.g..H
        Process:C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):73
        Entropy (8bit):4.84545516864142
        Encrypted:false
        SSDEEP:3:oNUWJRWxXUELLo22q+qgTRGGfWjC:oNNJAuEgJq+HGGfWjC
        MD5:1651BC143CC1BD2E5044B75929ED5180
        SHA1:893475F94E765C92D08821CEBD0F72181884B8C7
        SHA-256:34D493A6599BE5BF5CBFCCEA666D545AD33D9A85556ACA4E1219FEACB38D14A1
        SHA-512:2355872BF1572ABB70FFB53076DC746D86300006832B9B2837420F5A74AC0732CCD10C1F72AC67F3245367FDA49E4C0561DA46F5DC55FCB7D33B8AF1057F19F1
        Malicious:false
        Preview:C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):7.452519436311911
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
        • Win32 Executable (generic) a (10002005/4) 49.97%
        • Generic Win/DOS Executable (2004/3) 0.01%
        • DOS Executable Generic (2002/1) 0.01%
        File name:Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        File size:208192
        MD5:e587236cb6e5ccf2497ab08b245f724f
        SHA1:8b9f158fd574c4e982ec73e2368ebb4f6e4b566b
        SHA256:249a4af8064c560426fc8aea6fc23ee47a24ba800628d805f9eb0653b8e1d4f9
        SHA512:79bdf02544e533312d2bd9d5d899690a59e2713f6958210e30b8a41699b7752ee8ee939c4fcacfc5e57a1e22be21f228bfdec5990d24c1d23d403f65383b0cad
        SSDEEP:6144:nLV6Bta6dtJmakIM57s7UBmOKqVotp/wK328:nLV6BtpmkBQmGuAK328
        TLSH:3014CF2677A84A2FE2DE86BD702251168379C2E398C3F7DE28D451B78F167E10A471D3
        File Content Preview:MZ......................@.............................................m..:.^r.V.is program cannot be run in DOS mode....$.......PE..L...u9^..x8..................b........... ........@.. .................................... ................................
        Icon Hash:00828e8e8686b000
        Entrypoint:0x41e792
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        DLL Characteristics:HIGH_ENTROPY_VA
        Time Stamp:0x9E5E3975 [Fri Mar 13 00:40:21 2054 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
        Instruction
        jmp dword ptr [00402000h]
        add dword ptr [eax], eax
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add cl, ah
        xor dword ptr [esi-24h], FFFFFFD7h
        push edx
        sub dword ptr [ecx], ecx
        pop edi
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x1e7380x57.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x15fd8.elo
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x200000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x1c8000x1c800False0.5946494654605263data6.598686715608938IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .reloc0x200000x2000x200False0.076171875data0.32171607431271465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        .elo0x220000x15fd80x16000False1.0003107244318181data7.9978558519507255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountry
        RT_RCDATA0x220580x15f80data
        DLLImport
        mscoree.dll_CorExeMain
        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
        192.168.2.5216.218.135.1184970494972025019 02/02/23-13:52:37.416548TCP2025019ET TROJAN Possible NanoCore C2 60B497049497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184971494972025019 02/02/23-13:53:43.248786TCP2025019ET TROJAN Possible NanoCore C2 60B497149497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184970494972816718 02/02/23-13:52:37.610379TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497049497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184971994972816766 02/02/23-13:54:17.287135TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497199497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184970794972025019 02/02/23-13:53:11.027058TCP2025019ET TROJAN Possible NanoCore C2 60B497079497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184970694972816766 02/02/23-13:53:06.659044TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497069497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184971694972816766 02/02/23-13:53:51.482545TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497169497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184971894972816766 02/02/23-13:54:10.762374TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497189497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184971394972816718 02/02/23-13:53:38.638029TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497139497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184970594972816766 02/02/23-13:52:47.006733TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497059497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184971694972025019 02/02/23-13:53:49.540253TCP2025019ET TROJAN Possible NanoCore C2 60B497169497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184970694972025019 02/02/23-13:53:04.914468TCP2025019ET TROJAN Possible NanoCore C2 60B497069497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184970994972816766 02/02/23-13:53:19.141097TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497099497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184971994972025019 02/02/23-13:54:15.331062TCP2025019ET TROJAN Possible NanoCore C2 60B497199497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184970494972816766 02/02/23-13:52:39.164512TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497049497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184970394972025019 02/02/23-13:52:31.077436TCP2025019ET TROJAN Possible NanoCore C2 60B497039497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184970994972025019 02/02/23-13:53:17.202283TCP2025019ET TROJAN Possible NanoCore C2 60B497099497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184972094972816766 02/02/23-13:54:23.957947TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497209497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184970594972025019 02/02/23-13:52:43.940467TCP2025019ET TROJAN Possible NanoCore C2 60B497059497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184971494972816766 02/02/23-13:53:44.997752TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497149497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184971394972025019 02/02/23-13:53:36.615923TCP2025019ET TROJAN Possible NanoCore C2 60B497139497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184970394972816766 02/02/23-13:52:32.924340TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497039497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184971894972025019 02/02/23-13:54:08.817214TCP2025019ET TROJAN Possible NanoCore C2 60B497189497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184972094972025019 02/02/23-13:54:21.603489TCP2025019ET TROJAN Possible NanoCore C2 60B497209497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184970794972816766 02/02/23-13:53:12.773010TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497079497192.168.2.5216.218.135.118
        192.168.2.5216.218.135.1184971394972816766 02/02/23-13:53:38.843314TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497139497192.168.2.5216.218.135.118
        TimestampSource PortDest PortSource IPDest IP
        Feb 2, 2023 13:52:30.829849005 CET497039497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:31.024633884 CET949749703216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:31.024909019 CET497039497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:31.077435970 CET497039497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:31.271203995 CET949749703216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:31.368933916 CET497039497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:31.565625906 CET949749703216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:31.565787077 CET497039497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:31.759715080 CET949749703216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:31.759888887 CET497039497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:31.953443050 CET949749703216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:31.953566074 CET497039497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:32.149359941 CET949749703216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:32.149508953 CET497039497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:32.343123913 CET949749703216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:32.343324900 CET497039497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:32.536889076 CET949749703216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:32.536986113 CET497039497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:32.730629921 CET949749703216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:32.730711937 CET497039497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:32.924274921 CET949749703216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:32.924340010 CET497039497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:33.032847881 CET497039497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:33.117907047 CET949749703216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:33.117973089 CET497039497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:37.220767975 CET497049497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:37.415462971 CET949749704216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:37.415747881 CET497049497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:37.416548014 CET497049497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:37.610068083 CET949749704216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:37.610378981 CET497049497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:37.804006100 CET949749704216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:37.804152012 CET497049497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:37.997829914 CET949749704216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:37.997968912 CET497049497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:38.191600084 CET949749704216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:38.191828012 CET497049497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:38.386626959 CET949749704216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:38.386846066 CET497049497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:38.580442905 CET949749704216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:38.580596924 CET497049497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:38.776628017 CET949749704216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:38.776709080 CET497049497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:38.970408916 CET949749704216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:38.970501900 CET497049497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:39.164345026 CET949749704216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:39.164511919 CET497049497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:39.269047976 CET497049497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:39.358289003 CET949749704216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:39.358375072 CET497049497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:43.746020079 CET497059497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:43.939932108 CET949749705216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:43.940032005 CET497059497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:43.940466881 CET497059497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:44.134073019 CET949749705216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:44.134223938 CET497059497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:44.328047037 CET949749705216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:44.918446064 CET497059497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:45.112292051 CET949749705216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:45.454889059 CET497059497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:45.648586988 CET949749705216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:45.648741007 CET497059497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:45.843472958 CET949749705216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:45.843571901 CET497059497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:46.037422895 CET949749705216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:46.037647009 CET497059497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:46.231372118 CET949749705216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:46.231483936 CET497059497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:46.425019979 CET949749705216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:46.425132990 CET497059497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:46.618844986 CET949749705216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:46.619046926 CET497059497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:46.812693119 CET949749705216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:46.812881947 CET497059497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:47.006531954 CET949749705216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:47.006732941 CET497059497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:47.017621994 CET497059497192.168.2.5216.218.135.118
        Feb 2, 2023 13:52:47.200439930 CET949749705216.218.135.118192.168.2.5
        Feb 2, 2023 13:52:47.200515985 CET497059497192.168.2.5216.218.135.118
        Feb 2, 2023 13:53:04.719393969 CET497069497192.168.2.5216.218.135.118
        Feb 2, 2023 13:53:04.913069963 CET949749706216.218.135.118192.168.2.5
        Feb 2, 2023 13:53:04.913290977 CET497069497192.168.2.5216.218.135.118
        Feb 2, 2023 13:53:04.914468050 CET497069497192.168.2.5216.218.135.118
        Feb 2, 2023 13:53:05.108067989 CET949749706216.218.135.118192.168.2.5
        Feb 2, 2023 13:53:05.108247995 CET497069497192.168.2.5216.218.135.118
        Feb 2, 2023 13:53:05.301942110 CET949749706216.218.135.118192.168.2.5
        Feb 2, 2023 13:53:05.302042961 CET497069497192.168.2.5216.218.135.118
        Feb 2, 2023 13:53:05.495675087 CET949749706216.218.135.118192.168.2.5
        Feb 2, 2023 13:53:05.495810986 CET497069497192.168.2.5216.218.135.118
        Feb 2, 2023 13:53:05.689413071 CET949749706216.218.135.118192.168.2.5
        Feb 2, 2023 13:53:05.689577103 CET497069497192.168.2.5216.218.135.118
        Feb 2, 2023 13:53:05.883318901 CET949749706216.218.135.118192.168.2.5
        Feb 2, 2023 13:53:05.883480072 CET497069497192.168.2.5216.218.135.118
        Feb 2, 2023 13:53:06.077214956 CET949749706216.218.135.118192.168.2.5
        Feb 2, 2023 13:53:06.077378035 CET497069497192.168.2.5216.218.135.118
        Feb 2, 2023 13:53:06.271008015 CET949749706216.218.135.118192.168.2.5
        Feb 2, 2023 13:53:06.271168947 CET497069497192.168.2.5216.218.135.118
        Feb 2, 2023 13:53:06.465250015 CET949749706216.218.135.118192.168.2.5
        Feb 2, 2023 13:53:06.465341091 CET497069497192.168.2.5216.218.135.118
        Feb 2, 2023 13:53:06.658847094 CET949749706216.218.135.118192.168.2.5
        TimestampSource PortDest PortSource IPDest IP
        Feb 2, 2023 13:52:30.785638094 CET4917753192.168.2.58.8.8.8
        Feb 2, 2023 13:52:30.809514999 CET53491778.8.8.8192.168.2.5
        Feb 2, 2023 13:52:37.192082882 CET4972453192.168.2.58.8.8.8
        Feb 2, 2023 13:52:37.213845968 CET53497248.8.8.8192.168.2.5
        Feb 2, 2023 13:52:43.715668917 CET6145253192.168.2.58.8.8.8
        Feb 2, 2023 13:52:43.735198975 CET53614528.8.8.8192.168.2.5
        Feb 2, 2023 13:52:51.099303961 CET6532353192.168.2.58.8.8.8
        Feb 2, 2023 13:52:51.274023056 CET53653238.8.8.8192.168.2.5
        Feb 2, 2023 13:52:51.381551981 CET5148453192.168.2.58.8.4.4
        Feb 2, 2023 13:52:51.401228905 CET53514848.8.4.4192.168.2.5
        Feb 2, 2023 13:52:51.439233065 CET6344653192.168.2.58.8.8.8
        Feb 2, 2023 13:52:51.609329939 CET53634468.8.8.8192.168.2.5
        Feb 2, 2023 13:52:55.884648085 CET5675153192.168.2.58.8.8.8
        Feb 2, 2023 13:52:56.024313927 CET53567518.8.8.8192.168.2.5
        Feb 2, 2023 13:52:56.089971066 CET5503953192.168.2.58.8.4.4
        Feb 2, 2023 13:52:56.109600067 CET53550398.8.4.4192.168.2.5
        Feb 2, 2023 13:52:56.136313915 CET6097553192.168.2.58.8.8.8
        Feb 2, 2023 13:52:56.309134007 CET53609758.8.8.8192.168.2.5
        Feb 2, 2023 13:53:00.369370937 CET5922053192.168.2.58.8.8.8
        Feb 2, 2023 13:53:00.388981104 CET53592208.8.8.8192.168.2.5
        Feb 2, 2023 13:53:00.394347906 CET5506853192.168.2.58.8.4.4
        Feb 2, 2023 13:53:00.413863897 CET53550688.8.4.4192.168.2.5
        Feb 2, 2023 13:53:00.573218107 CET5668253192.168.2.58.8.8.8
        Feb 2, 2023 13:53:00.590332985 CET53566828.8.8.8192.168.2.5
        Feb 2, 2023 13:53:04.664993048 CET5853253192.168.2.58.8.8.8
        Feb 2, 2023 13:53:04.685724974 CET53585328.8.8.8192.168.2.5
        Feb 2, 2023 13:53:10.799266100 CET6265953192.168.2.58.8.8.8
        Feb 2, 2023 13:53:10.820059061 CET53626598.8.8.8192.168.2.5
        Feb 2, 2023 13:53:16.983659983 CET5626353192.168.2.58.8.8.8
        Feb 2, 2023 13:53:17.001274109 CET53562638.8.8.8192.168.2.5
        Feb 2, 2023 13:53:23.341100931 CET6441953192.168.2.58.8.8.8
        Feb 2, 2023 13:53:23.513459921 CET53644198.8.8.8192.168.2.5
        Feb 2, 2023 13:53:23.532455921 CET5268853192.168.2.58.8.4.4
        Feb 2, 2023 13:53:23.550225019 CET53526888.8.4.4192.168.2.5
        Feb 2, 2023 13:53:23.554807901 CET6134453192.168.2.58.8.8.8
        Feb 2, 2023 13:53:23.576509953 CET53613448.8.8.8192.168.2.5
        Feb 2, 2023 13:53:27.656083107 CET5397253192.168.2.58.8.8.8
        Feb 2, 2023 13:53:27.675067902 CET53539728.8.8.8192.168.2.5
        Feb 2, 2023 13:53:27.676650047 CET6493253192.168.2.58.8.4.4
        Feb 2, 2023 13:53:27.847728014 CET53649328.8.4.4192.168.2.5
        Feb 2, 2023 13:53:27.935981035 CET5847253192.168.2.58.8.8.8
        Feb 2, 2023 13:53:27.953819990 CET53584728.8.8.8192.168.2.5
        Feb 2, 2023 13:53:31.993725061 CET6028453192.168.2.58.8.8.8
        Feb 2, 2023 13:53:32.013403893 CET53602848.8.8.8192.168.2.5
        Feb 2, 2023 13:53:32.015000105 CET6001953192.168.2.58.8.4.4
        Feb 2, 2023 13:53:32.032545090 CET53600198.8.4.4192.168.2.5
        Feb 2, 2023 13:53:32.056422949 CET5090253192.168.2.58.8.8.8
        Feb 2, 2023 13:53:32.075882912 CET53509028.8.8.8192.168.2.5
        Feb 2, 2023 13:53:36.397737026 CET5382353192.168.2.58.8.8.8
        Feb 2, 2023 13:53:36.415522099 CET53538238.8.8.8192.168.2.5
        Feb 2, 2023 13:53:43.025010109 CET4976953192.168.2.58.8.8.8
        Feb 2, 2023 13:53:43.046535015 CET53497698.8.8.8192.168.2.5
        Feb 2, 2023 13:53:49.326673031 CET5355553192.168.2.58.8.8.8
        Feb 2, 2023 13:53:49.344393969 CET53535558.8.8.8192.168.2.5
        Feb 2, 2023 13:53:55.632159948 CET6129353192.168.2.58.8.8.8
        Feb 2, 2023 13:53:55.652245998 CET53612938.8.8.8192.168.2.5
        Feb 2, 2023 13:53:55.654360056 CET5008653192.168.2.58.8.4.4
        Feb 2, 2023 13:53:55.673933983 CET53500868.8.4.4192.168.2.5
        Feb 2, 2023 13:53:55.682020903 CET5218853192.168.2.58.8.8.8
        Feb 2, 2023 13:53:55.701627016 CET53521888.8.8.8192.168.2.5
        Feb 2, 2023 13:53:59.949156046 CET5458553192.168.2.58.8.8.8
        Feb 2, 2023 13:53:59.966969967 CET53545858.8.8.8192.168.2.5
        Feb 2, 2023 13:54:00.025202990 CET5210053192.168.2.58.8.4.4
        Feb 2, 2023 13:54:00.045074940 CET53521008.8.4.4192.168.2.5
        Feb 2, 2023 13:54:00.234499931 CET6090853192.168.2.58.8.8.8
        Feb 2, 2023 13:54:00.253770113 CET53609088.8.8.8192.168.2.5
        Feb 2, 2023 13:54:04.278805017 CET5862353192.168.2.58.8.8.8
        Feb 2, 2023 13:54:04.296454906 CET53586238.8.8.8192.168.2.5
        Feb 2, 2023 13:54:04.298249006 CET6549353192.168.2.58.8.4.4
        Feb 2, 2023 13:54:04.317616940 CET53654938.8.4.4192.168.2.5
        Feb 2, 2023 13:54:04.329217911 CET5748253192.168.2.58.8.8.8
        Feb 2, 2023 13:54:04.349050999 CET53574828.8.8.8192.168.2.5
        Feb 2, 2023 13:54:08.551012039 CET6205753192.168.2.58.8.8.8
        Feb 2, 2023 13:54:08.570725918 CET53620578.8.8.8192.168.2.5
        Feb 2, 2023 13:54:15.050424099 CET6029453192.168.2.58.8.8.8
        Feb 2, 2023 13:54:15.067796946 CET53602948.8.8.8192.168.2.5
        Feb 2, 2023 13:54:21.385283947 CET6372853192.168.2.58.8.8.8
        Feb 2, 2023 13:54:21.405025959 CET53637288.8.8.8192.168.2.5
        Feb 2, 2023 13:54:29.207783937 CET5007753192.168.2.58.8.8.8
        Feb 2, 2023 13:54:29.229578018 CET53500778.8.8.8192.168.2.5
        Feb 2, 2023 13:54:29.422302008 CET4995953192.168.2.58.8.4.4
        Feb 2, 2023 13:54:29.441528082 CET53499598.8.4.4192.168.2.5
        Feb 2, 2023 13:54:29.449975014 CET5560953192.168.2.58.8.8.8
        Feb 2, 2023 13:54:29.470909119 CET53556098.8.8.8192.168.2.5
        Feb 2, 2023 13:54:37.122015953 CET5289253192.168.2.58.8.8.8
        Feb 2, 2023 13:54:37.139646053 CET53528928.8.8.8192.168.2.5
        Feb 2, 2023 13:54:37.141393900 CET6533053192.168.2.58.8.4.4
        Feb 2, 2023 13:54:37.159055948 CET53653308.8.4.4192.168.2.5
        Feb 2, 2023 13:54:37.165865898 CET5297353192.168.2.58.8.8.8
        Feb 2, 2023 13:54:37.184803963 CET53529738.8.8.8192.168.2.5
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Feb 2, 2023 13:52:30.785638094 CET192.168.2.58.8.8.80x84aStandard query (0)doc4.ddns.netA (IP address)IN (0x0001)false
        Feb 2, 2023 13:52:37.192082882 CET192.168.2.58.8.8.80x1c22Standard query (0)doc4.ddns.netA (IP address)IN (0x0001)false
        Feb 2, 2023 13:52:43.715668917 CET192.168.2.58.8.8.80x33deStandard query (0)doc4.ddns.netA (IP address)IN (0x0001)false
        Feb 2, 2023 13:52:51.099303961 CET192.168.2.58.8.8.80xd6f6Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:52:51.381551981 CET192.168.2.58.8.4.40xb8b0Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:52:51.439233065 CET192.168.2.58.8.8.80xe20eStandard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:52:55.884648085 CET192.168.2.58.8.8.80x81a3Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:52:56.089971066 CET192.168.2.58.8.4.40x4ccfStandard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:52:56.136313915 CET192.168.2.58.8.8.80xf4e4Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:00.369370937 CET192.168.2.58.8.8.80x44a0Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:00.394347906 CET192.168.2.58.8.4.40x83b4Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:00.573218107 CET192.168.2.58.8.8.80x9279Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:04.664993048 CET192.168.2.58.8.8.80xd0acStandard query (0)doc4.ddns.netA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:10.799266100 CET192.168.2.58.8.8.80xf1a6Standard query (0)doc4.ddns.netA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:16.983659983 CET192.168.2.58.8.8.80x83b9Standard query (0)doc4.ddns.netA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:23.341100931 CET192.168.2.58.8.8.80x9df6Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:23.532455921 CET192.168.2.58.8.4.40x3466Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:23.554807901 CET192.168.2.58.8.8.80x6152Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:27.656083107 CET192.168.2.58.8.8.80x626dStandard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:27.676650047 CET192.168.2.58.8.4.40xbe1bStandard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:27.935981035 CET192.168.2.58.8.8.80x9dc2Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:31.993725061 CET192.168.2.58.8.8.80x6900Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:32.015000105 CET192.168.2.58.8.4.40x2c34Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:32.056422949 CET192.168.2.58.8.8.80x70ecStandard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:36.397737026 CET192.168.2.58.8.8.80x7750Standard query (0)doc4.ddns.netA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:43.025010109 CET192.168.2.58.8.8.80x1c56Standard query (0)doc4.ddns.netA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:49.326673031 CET192.168.2.58.8.8.80x139bStandard query (0)doc4.ddns.netA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:55.632159948 CET192.168.2.58.8.8.80x77fdStandard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:55.654360056 CET192.168.2.58.8.4.40x4540Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:55.682020903 CET192.168.2.58.8.8.80x1461Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:59.949156046 CET192.168.2.58.8.8.80xe785Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:00.025202990 CET192.168.2.58.8.4.40x1f2Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:00.234499931 CET192.168.2.58.8.8.80x434dStandard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:04.278805017 CET192.168.2.58.8.8.80xb31eStandard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:04.298249006 CET192.168.2.58.8.4.40x7cccStandard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:04.329217911 CET192.168.2.58.8.8.80xa5b5Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:08.551012039 CET192.168.2.58.8.8.80x2481Standard query (0)doc4.ddns.netA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:15.050424099 CET192.168.2.58.8.8.80x4a5cStandard query (0)doc4.ddns.netA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:21.385283947 CET192.168.2.58.8.8.80x9ec8Standard query (0)doc4.ddns.netA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:29.207783937 CET192.168.2.58.8.8.80x40b9Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:29.422302008 CET192.168.2.58.8.4.40xe659Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:29.449975014 CET192.168.2.58.8.8.80x4feeStandard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:37.122015953 CET192.168.2.58.8.8.80xde39Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:37.141393900 CET192.168.2.58.8.4.40xeb1aStandard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:37.165865898 CET192.168.2.58.8.8.80x6dc4Standard query (0)donald30m.gleeze.comA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Feb 2, 2023 13:52:30.809514999 CET8.8.8.8192.168.2.50x84aNo error (0)doc4.ddns.net216.218.135.118A (IP address)IN (0x0001)false
        Feb 2, 2023 13:52:37.213845968 CET8.8.8.8192.168.2.50x1c22No error (0)doc4.ddns.net216.218.135.118A (IP address)IN (0x0001)false
        Feb 2, 2023 13:52:43.735198975 CET8.8.8.8192.168.2.50x33deNo error (0)doc4.ddns.net216.218.135.118A (IP address)IN (0x0001)false
        Feb 2, 2023 13:52:51.274023056 CET8.8.8.8192.168.2.50xd6f6Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:52:51.401228905 CET8.8.4.4192.168.2.50xb8b0Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:52:51.609329939 CET8.8.8.8192.168.2.50xe20eName error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:52:56.024313927 CET8.8.8.8192.168.2.50x81a3Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:52:56.109600067 CET8.8.4.4192.168.2.50x4ccfName error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:52:56.309134007 CET8.8.8.8192.168.2.50xf4e4Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:00.388981104 CET8.8.8.8192.168.2.50x44a0Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:00.413863897 CET8.8.4.4192.168.2.50x83b4Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:00.590332985 CET8.8.8.8192.168.2.50x9279Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:04.685724974 CET8.8.8.8192.168.2.50xd0acNo error (0)doc4.ddns.net216.218.135.118A (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:10.820059061 CET8.8.8.8192.168.2.50xf1a6No error (0)doc4.ddns.net216.218.135.118A (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:17.001274109 CET8.8.8.8192.168.2.50x83b9No error (0)doc4.ddns.net216.218.135.118A (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:23.513459921 CET8.8.8.8192.168.2.50x9df6Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:23.550225019 CET8.8.4.4192.168.2.50x3466Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:23.576509953 CET8.8.8.8192.168.2.50x6152Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:27.675067902 CET8.8.8.8192.168.2.50x626dName error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:27.847728014 CET8.8.4.4192.168.2.50xbe1bName error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:27.953819990 CET8.8.8.8192.168.2.50x9dc2Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:32.013403893 CET8.8.8.8192.168.2.50x6900Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:32.032545090 CET8.8.4.4192.168.2.50x2c34Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:32.075882912 CET8.8.8.8192.168.2.50x70ecName error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:36.415522099 CET8.8.8.8192.168.2.50x7750No error (0)doc4.ddns.net216.218.135.118A (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:43.046535015 CET8.8.8.8192.168.2.50x1c56No error (0)doc4.ddns.net216.218.135.118A (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:49.344393969 CET8.8.8.8192.168.2.50x139bNo error (0)doc4.ddns.net216.218.135.118A (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:55.652245998 CET8.8.8.8192.168.2.50x77fdName error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:55.673933983 CET8.8.4.4192.168.2.50x4540Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:55.701627016 CET8.8.8.8192.168.2.50x1461Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:53:59.966969967 CET8.8.8.8192.168.2.50xe785Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:00.045074940 CET8.8.4.4192.168.2.50x1f2Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:00.253770113 CET8.8.8.8192.168.2.50x434dName error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:04.296454906 CET8.8.8.8192.168.2.50xb31eName error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:04.317616940 CET8.8.4.4192.168.2.50x7cccName error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:04.349050999 CET8.8.8.8192.168.2.50xa5b5Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:08.570725918 CET8.8.8.8192.168.2.50x2481No error (0)doc4.ddns.net216.218.135.118A (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:15.067796946 CET8.8.8.8192.168.2.50x4a5cNo error (0)doc4.ddns.net216.218.135.118A (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:21.405025959 CET8.8.8.8192.168.2.50x9ec8No error (0)doc4.ddns.net216.218.135.118A (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:29.229578018 CET8.8.8.8192.168.2.50x40b9Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:29.441528082 CET8.8.4.4192.168.2.50xe659Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:29.470909119 CET8.8.8.8192.168.2.50x4feeName error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:37.139646053 CET8.8.8.8192.168.2.50xde39Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:37.159055948 CET8.8.4.4192.168.2.50xeb1aName error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false
        Feb 2, 2023 13:54:37.184803963 CET8.8.8.8192.168.2.50x6dc4Name error (3)donald30m.gleeze.comnonenoneA (IP address)IN (0x0001)false

        Click to jump to process

        Target ID:0
        Start time:13:52:27
        Start date:02/02/2023
        Path:C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        Imagebase:0x2f0000
        File size:208192 bytes
        MD5 hash:E587236CB6E5CCF2497AB08B245F724F
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:.Net C# or VB.NET
        Yara matches:
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth (Nextron Systems)
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
        • Rule: NanoCore, Description: unknown, Source: 00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000000.309491180.00000000002F2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.584551400.00000000055C0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.584012735.0000000004CA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.584012735.0000000004CA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000000.00000002.584012735.0000000004CA0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.584012735.0000000004CA0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.579767237.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        Reputation:low

        Target ID:1
        Start time:13:52:28
        Start date:02/02/2023
        Path:C:\Windows\SysWOW64\schtasks.exe
        Wow64 process (32bit):true
        Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2F6A.tmp
        Imagebase:0x1280000
        File size:185856 bytes
        MD5 hash:15FF7D8324231381BAD48A052F85DF04
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Target ID:2
        Start time:13:52:28
        Start date:02/02/2023
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff7fcd70000
        File size:625664 bytes
        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Target ID:3
        Start time:13:52:29
        Start date:02/02/2023
        Path:C:\Windows\SysWOW64\schtasks.exe
        Wow64 process (32bit):true
        Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp315F.tmp
        Imagebase:0x1280000
        File size:185856 bytes
        MD5 hash:15FF7D8324231381BAD48A052F85DF04
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Target ID:4
        Start time:13:52:29
        Start date:02/02/2023
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff7fcd70000
        File size:625664 bytes
        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Target ID:5
        Start time:13:52:31
        Start date:02/02/2023
        Path:C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\Desktop\Trojan.MSIL.Agent.fpar-249a4af8064c560426fc8a.exe 0
        Imagebase:0x4d0000
        File size:208192 bytes
        MD5 hash:E587236CB6E5CCF2497AB08B245F724F
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:.Net C# or VB.NET
        Yara matches:
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.333232507.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.333232507.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000005.00000002.333232507.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        Reputation:low

        Target ID:6
        Start time:13:52:31
        Start date:02/02/2023
        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Wow64 process (32bit):true
        Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
        Imagebase:0xcb0000
        File size:208192 bytes
        MD5 hash:E587236CB6E5CCF2497AB08B245F724F
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:.Net C# or VB.NET
        Yara matches:
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.333152349.0000000004461000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.333152349.0000000004461000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000002.333152349.0000000004461000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.332991768.0000000003461000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.332991768.0000000003461000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000002.332991768.0000000003461000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth (Nextron Systems)
        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth (Nextron Systems)
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Joe Security
        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: ditekSHen
        • Rule: NanoCore, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: unknown
        Antivirus matches:
        • Detection: 100%, Avira
        • Detection: 100%, Joe Sandbox ML
        • Detection: 97%, ReversingLabs
        Reputation:low

        No disassembly