Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe

Overview

General Information

Sample Name:646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
Analysis ID:797493
MD5:e01a14abc90acecb1fe2aba8d3adb71f
SHA1:1dbe3b0d1e76eef6e1cd8c28e59a67b067eb6988
SHA256:646b292f7a79327604ddfdb0f535ee8d3832e46dc86a980986016fdba3d64627
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Cassandra Crypter
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe (PID: 1228 cmdline: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe MD5: E01A14ABC90ACECB1FE2ABA8D3ADB71F)
    • schtasks.exe (PID: 1308 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmp9381.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 1236 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe (PID: 5724 cmdline: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe MD5: E01A14ABC90ACECB1FE2ABA8D3ADB71F)
      • schtasks.exe (PID: 5060 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpBC6A.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 2024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5128 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpBDD3.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 1504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe (PID: 1900 cmdline: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe 0 MD5: E01A14ABC90ACECB1FE2ABA8D3ADB71F)
    • schtasks.exe (PID: 5004 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmpA582.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • hbVCUlv.exe (PID: 6028 cmdline: C:\Users\user\AppData\Roaming\hbVCUlv.exe MD5: E01A14ABC90ACECB1FE2ABA8D3ADB71F)
    • schtasks.exe (PID: 5172 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmp8DA5.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • hbVCUlv.exe (PID: 1228 cmdline: C:\Users\user\AppData\Roaming\hbVCUlv.exe MD5: E01A14ABC90ACECB1FE2ABA8D3ADB71F)
  • dhcpmon.exe (PID: 4788 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: E01A14ABC90ACECB1FE2ABA8D3ADB71F)
    • schtasks.exe (PID: 6044 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmpA776.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 6088 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: E01A14ABC90ACECB1FE2ABA8D3ADB71F)
  • dhcpmon.exe (PID: 4600 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: E01A14ABC90ACECB1FE2ABA8D3ADB71F)
    • schtasks.exe (PID: 4492 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmpCABE.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 5072 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: E01A14ABC90ACECB1FE2ABA8D3ADB71F)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "10210cfb-2ea1-47f3-8c75-6fce83e4", "Group": "oob", "Domain1": "brianbriano.ddns.net", "Domain2": "127.0.0.1", "Port": 10001, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x238a7:$a: NanoCore
    • 0x23900:$a: NanoCore
    • 0x2393d:$a: NanoCore
    • 0x239b6:$a: NanoCore
    • 0x23909:$b: ClientPlugin
    • 0x23946:$b: ClientPlugin
    • 0x24244:$b: ClientPlugin
    • 0x24251:$b: ClientPlugin
    • 0x1b605:$e: KeepAlive
    • 0x23d91:$g: LogClientMessage
    • 0x23d11:$i: get_Connected
    • 0x158d9:$j: #=q
    • 0x15909:$j: #=q
    • 0x15945:$j: #=q
    • 0x1596d:$j: #=q
    • 0x1599d:$j: #=q
    • 0x159cd:$j: #=q
    • 0x159fd:$j: #=q
    • 0x15a2d:$j: #=q
    • 0x15a49:$j: #=q
    • 0x15a79:$j: #=q
    00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x2393d:$a1: NanoCore.ClientPluginHost
    • 0x23900:$a2: NanoCore.ClientPlugin
    • 0x16e13:$b1: get_BuilderSettings
    • 0x23cd4:$b1: get_BuilderSettings
    • 0x2398b:$b4: IClientAppHost
    • 0x23d45:$b6: AddHostEntry
    • 0x16d82:$b7: LogClientException
    • 0x23db4:$b7: LogClientException
    • 0x23d29:$b8: PipeExists
    • 0x23978:$b9: IClientLoggingHost
    00000000.00000002.307508938.0000000002B6A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CassandraCrypterYara detected Cassandra CrypterJoe Security
      00000008.00000002.318734843.0000000002ECA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CassandraCrypterYara detected Cassandra CrypterJoe Security
        Click to see the 54 entries
        SourceRuleDescriptionAuthorStrings
        0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e90000.6.unpackINDICATOR_EXE_Packed_CassandraDetects executables packed with Cassandra/CyaXditekSHen
        • 0x74f:$pdb: \CyaX\obj\Debug\CyaX.pdb
        12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
        • 0x1018d:$x1: NanoCore.ClientPluginHost
        • 0x101ca:$x2: IClientNetworkHost
        • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
        • 0xff05:$x1: NanoCore Client.exe
        • 0x1018d:$x2: NanoCore.ClientPluginHost
        • 0x117c6:$s1: PluginCommand
        • 0x117ba:$s2: FileCommand
        • 0x1266b:$s3: PipeExists
        • 0x18422:$s4: PipeCreated
        • 0x101b7:$s5: IClientLoggingHost
        12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
          • 0xfef5:$x1: NanoCore Client
          • 0xff05:$x1: NanoCore Client
          • 0x1014d:$x2: NanoCore.ClientPlugin
          • 0x1018d:$x3: NanoCore.ClientPluginHost
          • 0x10142:$i1: IClientApp
          • 0x10163:$i2: IClientData
          • 0x1016f:$i3: IClientNetwork
          • 0x1017e:$i4: IClientAppHost
          • 0x101a7:$i5: IClientDataHost
          • 0x101b7:$i6: IClientLoggingHost
          • 0x101ca:$i7: IClientNetworkHost
          • 0x101dd:$i8: IClientUIHost
          • 0x101eb:$i9: IClientNameObjectCollection
          • 0x10207:$i10: IClientReadOnlyNameObjectCollection
          • 0xff54:$s1: ClientPlugin
          • 0x10156:$s1: ClientPlugin
          • 0x1064a:$s2: EndPoint
          • 0x10653:$s3: IPAddress
          • 0x1065d:$s4: IPEndPoint
          • 0x12093:$s6: get_ClientSettings
          • 0x12637:$s7: get_Connected
          Click to see the 92 entries

          AV Detection

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, ProcessId: 5724, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          E-Banking Fraud

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, ProcessId: 5724, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Persistence and Installation Behavior

          barindex
          Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmp9381.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmp9381.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, ParentImage: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, ParentProcessId: 1228, ParentProcessName: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmp9381.tmp, ProcessId: 1308, ProcessName: schtasks.exe

          Stealing of Sensitive Information

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, ProcessId: 5724, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Remote Access Functionality

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, ProcessId: 5724, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
          Timestamp:192.168.2.4184.105.237.19549710100012025019 02/03/23-00:28:31.654776
          SID:2025019
          Source Port:49710
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549710100012816766 02/03/23-00:28:33.834752
          SID:2816766
          Source Port:49710
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549696100012025019 02/03/23-00:27:05.348657
          SID:2025019
          Source Port:49696
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549714100012025019 02/03/23-00:28:55.473039
          SID:2025019
          Source Port:49714
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549703100012025019 02/03/23-00:27:48.578100
          SID:2025019
          Source Port:49703
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549697100012025019 02/03/23-00:27:11.697985
          SID:2025019
          Source Port:49697
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549698100012025019 02/03/23-00:27:19.121500
          SID:2025019
          Source Port:49698
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549709100012025019 02/03/23-00:28:24.651689
          SID:2025019
          Source Port:49709
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549702100012025019 02/03/23-00:27:42.402353
          SID:2025019
          Source Port:49702
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549698100012816766 02/03/23-00:27:21.094469
          SID:2816766
          Source Port:49698
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549715100012816766 02/03/23-00:29:05.373729
          SID:2816766
          Source Port:49715
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549697100012816766 02/03/23-00:27:13.460347
          SID:2816766
          Source Port:49697
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549708100012025019 02/03/23-00:28:17.926799
          SID:2025019
          Source Port:49708
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549696100012816766 02/03/23-00:27:07.112967
          SID:2816766
          Source Port:49696
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549703100012816766 02/03/23-00:27:50.380926
          SID:2816766
          Source Port:49703
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549714100012816766 02/03/23-00:28:58.124908
          SID:2816766
          Source Port:49714
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549704100012816766 02/03/23-00:27:57.519906
          SID:2816766
          Source Port:49704
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549708100012816766 02/03/23-00:28:19.942981
          SID:2816766
          Source Port:49708
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549709100012816766 02/03/23-00:28:26.847077
          SID:2816766
          Source Port:49709
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549697100012816718 02/03/23-00:27:12.093478
          SID:2816718
          Source Port:49697
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549704100012025019 02/03/23-00:27:55.553197
          SID:2025019
          Source Port:49704
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549715100012025019 02/03/23-00:29:04.002318
          SID:2025019
          Source Port:49715
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549702100012816766 02/03/23-00:27:44.172937
          SID:2816766
          Source Port:49702
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4184.105.237.19549708100012816718 02/03/23-00:28:19.942981
          SID:2816718
          Source Port:49708
          Destination Port:10001
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeReversingLabs: Detection: 82%
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeVirustotal: Detection: 73%Perma Link
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeAvira: detected
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeAvira: detection malicious, Label: HEUR/AGEN.1202153
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeAvira: detection malicious, Label: HEUR/AGEN.1202153
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 82%
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeVirustotal: Detection: 73%Perma Link
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeReversingLabs: Detection: 82%
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.46730c5.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e14629.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.4669c66.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.355128673.0000000003151000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.311567488.0000000003B31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.342518655.0000000003621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.342969185.0000000004621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.332550764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5724, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5244, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6088, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: hbVCUlv.exe PID: 1228, type: MEMORYSTR
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeJoe Sandbox ML: detected
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.unpackAvira: Label: TR/NanoCore.fadte
          Source: 00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "10210cfb-2ea1-47f3-8c75-6fce83e4", "Group": "oob", "Domain1": "brianbriano.ddns.net", "Domain2": "127.0.0.1", "Port": 10001, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.307508938.0000000002B6A000.00000004.00000800.00020000.00000000.sdmp, 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.314578400.0000000005E90000.00000004.08000000.00040000.00000000.sdmp, 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000008.00000002.318734843.0000000002ECA000.00000004.00000800.00020000.00000000.sdmp, hbVCUlv.exe, 00000009.00000002.331266992.000000000371A000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000D.00000002.324082470.000000000315A000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdbTDnD `D_CorDllMainmscoree.dll source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.307508938.0000000002B6A000.00000004.00000800.00020000.00000000.sdmp, 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.314578400.0000000005E90000.00000004.08000000.00040000.00000000.sdmp, 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000008.00000002.318734843.0000000002ECA000.00000004.00000800.00020000.00000000.sdmp, hbVCUlv.exe, 00000009.00000002.331266992.000000000371A000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000D.00000002.324082470.000000000315A000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.572467871.00000000012F5000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Users\Sako\source\repos\NvidiaCatalysts\NvidiaCatalysts\obj\Debug\NvidiaCatalysts.pdb source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.307508938.0000000002DDC000.00000004.00000800.00020000.00000000.sdmp, 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.313010978.0000000004D40000.00000004.08000000.00040000.00000000.sdmp, hbVCUlv.exe, 00000009.00000002.331266992.000000000398C000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000D.00000002.324082470.00000000033CC000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.349071481.0000000002C91000.00000004.00000800.00020000.00000000.sdmp

          Networking

          barindex
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49696 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49696 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49697 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49697 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.4:49697 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49698 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49698 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49702 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49702 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49703 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49703 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49704 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49704 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49708 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49708 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.4:49708 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49709 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49709 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49710 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49710 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49714 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49714 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49715 -> 184.105.237.195:10001
          Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49715 -> 184.105.237.195:10001
          Source: Malware configuration extractorURLs: brianbriano.ddns.net
          Source: Malware configuration extractorURLs: 127.0.0.1
          Source: unknownDNS query: name: brianbriano.ddns.net
          Source: Joe Sandbox ViewASN Name: RVBA2016US RVBA2016US
          Source: Joe Sandbox ViewIP Address: 184.105.237.195 184.105.237.195
          Source: global trafficTCP traffic: 192.168.2.4:49696 -> 184.105.237.195:10001
          Source: unknownDNS traffic detected: queries for: brianbriano.ddns.net
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_05443242 WSARecv,
          Source: hbVCUlv.exe, 00000009.00000002.329810050.00000000015AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.46730c5.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e14629.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.4669c66.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.355128673.0000000003151000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.311567488.0000000003B31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.342518655.0000000003621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.342969185.0000000004621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.332550764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5724, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5244, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6088, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: hbVCUlv.exe PID: 1228, type: MEMORYSTR

          System Summary

          barindex
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e90000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Cassandra/CyaX Author: ditekSHen
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 9.2.hbVCUlv.exe.3731598.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Cassandra/CyaX Author: ditekSHen
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3cfb720.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Cassandra/CyaX Author: ditekSHen
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.51d0000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Cassandra/CyaX Author: ditekSHen
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.46730c5.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.46730c5.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.46730c5.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e90000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Cassandra/CyaX Author: ditekSHen
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e14629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e14629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e14629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 8.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.2ee1600.0.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Cassandra/CyaX Author: ditekSHen
          Source: 8.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.2ee1600.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Cassandra/CyaX Author: ditekSHen
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.2b845cc.1.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Cassandra/CyaX Author: ditekSHen
          Source: 9.2.hbVCUlv.exe.3731598.1.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Cassandra/CyaX Author: ditekSHen
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3cfb720.2.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Cassandra/CyaX Author: ditekSHen
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.2b845cc.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Cassandra/CyaX Author: ditekSHen
          Source: 13.2.dhcpmon.exe.31715b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Cassandra/CyaX Author: ditekSHen
          Source: 19.2.hbVCUlv.exe.31739fc.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 19.2.hbVCUlv.exe.31739fc.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 19.2.hbVCUlv.exe.31739fc.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 13.2.dhcpmon.exe.31715b8.1.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Cassandra/CyaX Author: ditekSHen
          Source: 16.2.dhcpmon.exe.2823ac8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 16.2.dhcpmon.exe.2823ac8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 16.2.dhcpmon.exe.2823ac8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.51d0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Cassandra/CyaX Author: ditekSHen
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5b70000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5b70000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5b70000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3643ba4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3643ba4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3643ba4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.32116b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.32116b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.32116b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.4669c66.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.4669c66.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.4669c66.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.4669c66.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000013.00000002.355128673.0000000003151000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000013.00000002.355128673.0000000003151000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.578951789.0000000005B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 00000003.00000002.578951789.0000000005B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000003.00000002.578951789.0000000005B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000000.00000002.314033178.00000000051D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables packed with Cassandra/CyaX Author: ditekSHen
          Source: 00000000.00000002.311567488.0000000003B31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 00000000.00000002.311567488.0000000003B31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.311567488.0000000003B31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000000.00000002.314578400.0000000005E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables packed with Cassandra/CyaX Author: ditekSHen
          Source: 00000003.00000002.573594094.0000000003201000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0000000C.00000002.342518655.0000000003621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000C.00000002.342518655.0000000003621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0000000C.00000002.342969185.0000000004621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000C.00000002.342969185.0000000004621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0000000C.00000002.332550764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 0000000C.00000002.332550764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000C.00000002.332550764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5724, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5724, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5244, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5244, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5244, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: Process Memory Space: dhcpmon.exe PID: 6088, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: dhcpmon.exe PID: 6088, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: Process Memory Space: hbVCUlv.exe PID: 1228, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: hbVCUlv.exe PID: 1228, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e90000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Cassandra author = ditekSHen, description = Detects executables packed with Cassandra/CyaX
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 9.2.hbVCUlv.exe.3731598.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Cassandra author = ditekSHen, description = Detects executables packed with Cassandra/CyaX
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3cfb720.2.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, score = 2021-01-22, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2021-01-25
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3cfb720.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Cassandra author = ditekSHen, description = Detects executables packed with Cassandra/CyaX
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.51d0000.5.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, score = 2021-01-22, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2021-01-25
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.51d0000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Cassandra author = ditekSHen, description = Detects executables packed with Cassandra/CyaX
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.46730c5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.46730c5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.46730c5.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.46730c5.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e90000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Cassandra author = ditekSHen, description = Detects executables packed with Cassandra/CyaX
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e14629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e14629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e14629.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e14629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 8.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.2ee1600.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Cassandra author = ditekSHen, description = Detects executables packed with Cassandra/CyaX
          Source: 8.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.2ee1600.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Cassandra author = ditekSHen, description = Detects executables packed with Cassandra/CyaX
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.2b845cc.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Cassandra author = ditekSHen, description = Detects executables packed with Cassandra/CyaX
          Source: 9.2.hbVCUlv.exe.3731598.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Cassandra author = ditekSHen, description = Detects executables packed with Cassandra/CyaX
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3cfb720.2.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, score = 2021-01-22, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2021-01-25
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3cfb720.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Cassandra author = ditekSHen, description = Detects executables packed with Cassandra/CyaX
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.2b845cc.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Cassandra author = ditekSHen, description = Detects executables packed with Cassandra/CyaX
          Source: 13.2.dhcpmon.exe.31715b8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Cassandra author = ditekSHen, description = Detects executables packed with Cassandra/CyaX
          Source: 19.2.hbVCUlv.exe.31739fc.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 19.2.hbVCUlv.exe.31739fc.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 19.2.hbVCUlv.exe.31739fc.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 19.2.hbVCUlv.exe.31739fc.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 13.2.dhcpmon.exe.31715b8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Cassandra author = ditekSHen, description = Detects executables packed with Cassandra/CyaX
          Source: 16.2.dhcpmon.exe.2823ac8.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 16.2.dhcpmon.exe.2823ac8.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 16.2.dhcpmon.exe.2823ac8.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 16.2.dhcpmon.exe.2823ac8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.51d0000.5.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, score = 2021-01-22, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2021-01-25
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.51d0000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Cassandra author = ditekSHen, description = Detects executables packed with Cassandra/CyaX
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5b70000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5b70000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5b70000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5b70000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3643ba4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3643ba4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3643ba4.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3643ba4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.32116b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.32116b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.32116b0.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.32116b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.4669c66.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.4669c66.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.4669c66.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.4669c66.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.4669c66.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000013.00000002.355128673.0000000003151000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000013.00000002.355128673.0000000003151000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.578951789.0000000005B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000003.00000002.578951789.0000000005B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000003.00000002.578951789.0000000005B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000003.00000002.578951789.0000000005B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000000.00000002.314033178.00000000051D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, score = 2021-01-22, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2021-01-25
          Source: 00000000.00000002.314033178.00000000051D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_EXE_Packed_Cassandra author = ditekSHen, description = Detects executables packed with Cassandra/CyaX
          Source: 00000000.00000002.311567488.0000000003B31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000000.00000002.311567488.0000000003B31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.311567488.0000000003B31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000000.00000002.314578400.0000000005E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_EXE_Packed_Cassandra author = ditekSHen, description = Detects executables packed with Cassandra/CyaX
          Source: 00000003.00000002.573594094.0000000003201000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0000000C.00000002.342518655.0000000003621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000C.00000002.342518655.0000000003621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0000000C.00000002.342969185.0000000004621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000C.00000002.342969185.0000000004621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0000000C.00000002.332550764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0000000C.00000002.332550764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000C.00000002.332550764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5724, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5724, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5244, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5244, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5244, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: Process Memory Space: dhcpmon.exe PID: 6088, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: dhcpmon.exe PID: 6088, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: Process Memory Space: hbVCUlv.exe PID: 1228, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: hbVCUlv.exe PID: 1228, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D53C4B
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D53468
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D5D198
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D54551
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D51D70
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D5D6B8
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D5E230
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D5DBC0
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D5A4F8
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D5C490
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D53441
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D54063
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D55DC0
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D529BC
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D57100
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D57530
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D572D0
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D59ACB
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D572E0
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D5CA00
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D513DB
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D557E4
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D5CFA0
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D59B5A
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D59F40
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D57708
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D5AF28
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_053289D8
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_05323850
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_053223A0
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_05322FA8
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_0532B2A8
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_053295D8
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_0532306F
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_053232BB
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_0532969F
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05064560
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05061D80
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05063C58
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05063468
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_0506D4A8
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_0506DB18
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_0506CFA0
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_0506BFD8
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05067100
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05067522
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05067530
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05064551
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_050629B1
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_050629C0
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05063411
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05063442
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05063C4A
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05064061
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05064070
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_0506C490
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_0506A4A8
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_0506A4F8
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05067708
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05067718
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_0506AF28
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05069F30
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05069F40
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05069B6A
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_0506D768
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_050613DB
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_050657D9
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_050657E8
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_0506ABF0
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_0506CA00
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_050672D0
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_050672E0
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E1D80
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E4560
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019ED4A8
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E3C58
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E3468
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019ECFA0
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019EBFD8
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019EDB18
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019EB180
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E29B1
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E29C0
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E7100
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E7530
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E7522
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E4551
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019EC490
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019EA4F8
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E70F0
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E3C4A
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E4070
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E4061
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E13DB
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E57D9
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E33C8
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019EABF0
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E57E8
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E7718
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E7708
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E9F30
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019EAF28
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E9F40
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019ED768
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E72D0
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E72E0
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019ECA00
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 12_2_05783850
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 12_2_05782FA8
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 12_2_057823A0
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 12_2_0578306F
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_05351D70
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_05354551
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_05353468
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_05353C4A
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_0535D4A8
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_0535DB18
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_0535CFA0
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_0535BFD8
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_05357530
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_05357522
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_05357100
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_053529B1
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_053599A6
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_05354061
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_05353442
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_0535C490
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_053570F0
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_0535A4F8
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_0535AF28
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_05359F40
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_053533DE
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_053557D9
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_053513DB
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_0535CA00
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_053572E0
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_053572D0
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_053552DF
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_053576C8
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_05441BB2 NtQuerySystemInformation,
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_05441B77 NtQuerySystemInformation,
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.307508938.0000000002B6A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCyaX.dll0 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.307508938.0000000002DDC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNvidiaCatalysts.dll@ vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.314033178.00000000051D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCyaX-Sharp.exe6 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.314578400.0000000005E90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCyaX.dll0 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000000.302015561.0000000000564000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBuilderLibrary.exe> vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.313010978.0000000004D40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNvidiaCatalysts.dll@ vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.579021289.0000000005CC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.571610675.00000000010F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBuil vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.578951789.0000000005B70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.573594094.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.576893393.0000000004267000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.576893393.0000000004280000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000008.00000002.318734843.0000000002ECA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCyaX.dll0 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000008.00000002.320823236.00000000040A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCyaX-Sharp.exe6 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000008.00000002.317270185.000000000100A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 0000000C.00000002.341271791.000000000176A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 0000000C.00000002.342518655.0000000003621000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 0000000C.00000002.342518655.0000000003621000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 0000000C.00000002.342969185.0000000004621000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 0000000C.00000002.342969185.0000000004621000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 0000000C.00000002.342969185.0000000004621000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeBinary or memory string: OriginalFilenameBuilderLibrary.exe> vs 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: hbVCUlv.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: dhcpmon.exe.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeReversingLabs: Detection: 82%
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeVirustotal: Detection: 73%
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeFile read: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeJump to behavior
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmp9381.tmp
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpBC6A.tmp
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpBDD3.tmp
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe 0
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\hbVCUlv.exe C:\Users\user\AppData\Roaming\hbVCUlv.exe
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmpA582.tmp
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmpA776.tmp
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmp8DA5.tmp
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess created: C:\Users\user\AppData\Roaming\hbVCUlv.exe C:\Users\user\AppData\Roaming\hbVCUlv.exe
          Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmpCABE.tmp
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmp9381.tmp
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpBC6A.tmp
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpBDD3.tmp
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmpA582.tmp
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmp8DA5.tmp
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess created: C:\Users\user\AppData\Roaming\hbVCUlv.exe C:\Users\user\AppData\Roaming\hbVCUlv.exe
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmpA776.tmp
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmpCABE.tmp
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_05441972 AdjustTokenPrivileges,
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_0544193B AdjustTokenPrivileges,
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeFile created: C:\Users\user\AppData\Roaming\hbVCUlv.exeJump to behavior
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeFile created: C:\Users\user\AppData\Local\Temp\tmp9381.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@36/16@11/2
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1504:120:WilError_01
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{10210cfb-2ea1-47f3-8c75-6fce83e45536}
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5232:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:640:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6076:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1236:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2024:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:476:120:WilError_01
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.307508938.0000000002B6A000.00000004.00000800.00020000.00000000.sdmp, 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.314578400.0000000005E90000.00000004.08000000.00040000.00000000.sdmp, 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000008.00000002.318734843.0000000002ECA000.00000004.00000800.00020000.00000000.sdmp, hbVCUlv.exe, 00000009.00000002.331266992.000000000371A000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000D.00000002.324082470.000000000315A000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdbTDnD `D_CorDllMainmscoree.dll source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.307508938.0000000002B6A000.00000004.00000800.00020000.00000000.sdmp, 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.314578400.0000000005E90000.00000004.08000000.00040000.00000000.sdmp, 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000008.00000002.318734843.0000000002ECA000.00000004.00000800.00020000.00000000.sdmp, hbVCUlv.exe, 00000009.00000002.331266992.000000000371A000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000D.00000002.324082470.000000000315A000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.572467871.00000000012F5000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Users\Sako\source\repos\NvidiaCatalysts\NvidiaCatalysts\obj\Debug\NvidiaCatalysts.pdb source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.307508938.0000000002DDC000.00000004.00000800.00020000.00000000.sdmp, 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.313010978.0000000004D40000.00000004.08000000.00040000.00000000.sdmp, hbVCUlv.exe, 00000009.00000002.331266992.000000000398C000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000D.00000002.324082470.00000000033CC000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.349071481.0000000002C91000.00000004.00000800.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, MDXBuilderLibrary/mdx/customs.sap/OamwprvrocOJZnNrAmQoLkQzciYnGqbYgJj.cs.Net Code: qxkGUihlCJoTUsiRmINKakbBkAYUkuvqVcD System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: hbVCUlv.exe.0.dr, MDXBuilderLibrary/mdx/customs.sap/OamwprvrocOJZnNrAmQoLkQzciYnGqbYgJj.cs.Net Code: qxkGUihlCJoTUsiRmINKakbBkAYUkuvqVcD System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.0.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.500000.0.unpack, MDXBuilderLibrary/mdx/customs.sap/OamwprvrocOJZnNrAmQoLkQzciYnGqbYgJj.cs.Net Code: qxkGUihlCJoTUsiRmINKakbBkAYUkuvqVcD System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: dhcpmon.exe.3.dr, MDXBuilderLibrary/mdx/customs.sap/OamwprvrocOJZnNrAmQoLkQzciYnGqbYgJj.cs.Net Code: qxkGUihlCJoTUsiRmINKakbBkAYUkuvqVcD System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D5842B push ebp; iretd
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_04D52D0F push eax; ret
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_01319D74 push eax; retf
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_01319D78 pushad ; retf
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_0506842B push ebp; iretd
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 8_2_05062CFD push eax; ret
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E2D0F push eax; ret
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeCode function: 9_2_019E842B push ebp; iretd
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 12_2_016A2BAD push 00000001h; ret
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_0535842B push ebp; iretd
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_05352CFD push eax; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.954638266049198
          Source: initial sampleStatic PE information: section name: .text entropy: 7.954638266049198
          Source: initial sampleStatic PE information: section name: .text entropy: 7.954638266049198
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, MDXBuilderLibrary/mdx/hYjztwlHalratuEEXrgEdjRuSEaXIDhor.csHigh entropy of concatenated method names: 'qfhRjEZoBmHHgAuEThlXpPUOCioHGubpjynu', 'qjsafFJQsqccTFnSJqIcimYDXAtNjzwwWkeN', 'uDEkyqWoXGysovpGfWgAujswYWYJKWRzEGnt', 'tTWuYDwPjgILtYSWzoAQOEUqJgdGdINjhRu', 'msyjRUfRlxCuBiscHvzcjREXDgEwOWVSuHT', 'kSQNgYPoETokzqwKLVipXOaRhtsZJvaNiELO', '.ctor', 'WcKjEmIXNlXadilcqmLauzSXvHrXZxSlZ', 'JlEAKuzlbepEGlheqolAINakbWRTxXvom', 'pBGrzvtuSUwHahONhsPiKPWlDlcSGBHEmpeC'
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, MDXBuilderLibrary/mdx/customs.sap/XXeWeEglvjQktonzXhCTIjJiTcahnsNdq.csHigh entropy of concatenated method names: '.ctor', '.ctor', 'QURgdwyLfCIfiFZDfQgtUtZWWYZzkXSyeyri', 'QbZDkIDNcpEomWODPjXhrrdDnbGLChjImrT', 'GoPsvbRWwRIwWBjTDqmgbsigLLLeyLXOv', 'STIWOGXwVnvYBvxhgPIGhERDXdVyeQJJIGL', 'yZthNsErVZVYyqKzgCHGpqXUvKGNvUYBpR', 'voXffePzeOHqPGhyAuoZacDQWupKkRNajx', 'SBUURBBAVFruSFjpEJfUmwxzSuKJwbOYPgrk', 'ngeANWcCjSvhLbWOqlkGdpyyFHqZqBVAEv'
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, MDXBuilderLibrary/mdx/customs.sap/XFPcyOixxYugHBqLtySoJiQIRUtuezDVrZQ.csHigh entropy of concatenated method names: 'PyYpzdKsjrdgNgiQbFIJqsQYwlHFQJTaVmv', 'pHelfmkwACXpeglIPkBSKyVixwdSWBVeF', 'dXCpGbNnZULUQlwUojGiOqgRRCUAUbAtIbvg', 'CrbIuGShxeHphIZwjAtYzWdUhYkcqrHBuDl', 'QdIsQtNcJScnuDBRRsDVNOAExGNaRNQUEd', 'dPLqBGnivUzuUVVuQBOAyHmNiwZqWOokh', 'JAlDgJtdqlVUqTJaxQDKVPmiNVGCWsitxVA', 'hjBgqGWldQjKUoGcofuFnkOEkjRerdyue', 'qxeTROOsFopHDpZsiRBWwTHycICdrcarWGi'
          Source: hbVCUlv.exe.0.dr, MDXBuilderLibrary/mdx/hYjztwlHalratuEEXrgEdjRuSEaXIDhor.csHigh entropy of concatenated method names: 'qfhRjEZoBmHHgAuEThlXpPUOCioHGubpjynu', 'qjsafFJQsqccTFnSJqIcimYDXAtNjzwwWkeN', 'uDEkyqWoXGysovpGfWgAujswYWYJKWRzEGnt', 'tTWuYDwPjgILtYSWzoAQOEUqJgdGdINjhRu', 'msyjRUfRlxCuBiscHvzcjREXDgEwOWVSuHT', 'kSQNgYPoETokzqwKLVipXOaRhtsZJvaNiELO', '.ctor', 'WcKjEmIXNlXadilcqmLauzSXvHrXZxSlZ', 'JlEAKuzlbepEGlheqolAINakbWRTxXvom', 'pBGrzvtuSUwHahONhsPiKPWlDlcSGBHEmpeC'
          Source: hbVCUlv.exe.0.dr, MDXBuilderLibrary/mdx/customs.sap/XFPcyOixxYugHBqLtySoJiQIRUtuezDVrZQ.csHigh entropy of concatenated method names: 'PyYpzdKsjrdgNgiQbFIJqsQYwlHFQJTaVmv', 'pHelfmkwACXpeglIPkBSKyVixwdSWBVeF', 'dXCpGbNnZULUQlwUojGiOqgRRCUAUbAtIbvg', 'CrbIuGShxeHphIZwjAtYzWdUhYkcqrHBuDl', 'QdIsQtNcJScnuDBRRsDVNOAExGNaRNQUEd', 'dPLqBGnivUzuUVVuQBOAyHmNiwZqWOokh', 'JAlDgJtdqlVUqTJaxQDKVPmiNVGCWsitxVA', 'hjBgqGWldQjKUoGcofuFnkOEkjRerdyue', 'qxeTROOsFopHDpZsiRBWwTHycICdrcarWGi'
          Source: hbVCUlv.exe.0.dr, MDXBuilderLibrary/mdx/customs.sap/XXeWeEglvjQktonzXhCTIjJiTcahnsNdq.csHigh entropy of concatenated method names: '.ctor', '.ctor', 'QURgdwyLfCIfiFZDfQgtUtZWWYZzkXSyeyri', 'QbZDkIDNcpEomWODPjXhrrdDnbGLChjImrT', 'GoPsvbRWwRIwWBjTDqmgbsigLLLeyLXOv', 'STIWOGXwVnvYBvxhgPIGhERDXdVyeQJJIGL', 'yZthNsErVZVYyqKzgCHGpqXUvKGNvUYBpR', 'voXffePzeOHqPGhyAuoZacDQWupKkRNajx', 'SBUURBBAVFruSFjpEJfUmwxzSuKJwbOYPgrk', 'ngeANWcCjSvhLbWOqlkGdpyyFHqZqBVAEv'
          Source: 0.0.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.500000.0.unpack, MDXBuilderLibrary/mdx/hYjztwlHalratuEEXrgEdjRuSEaXIDhor.csHigh entropy of concatenated method names: 'qfhRjEZoBmHHgAuEThlXpPUOCioHGubpjynu', 'qjsafFJQsqccTFnSJqIcimYDXAtNjzwwWkeN', 'uDEkyqWoXGysovpGfWgAujswYWYJKWRzEGnt', 'tTWuYDwPjgILtYSWzoAQOEUqJgdGdINjhRu', 'msyjRUfRlxCuBiscHvzcjREXDgEwOWVSuHT', 'kSQNgYPoETokzqwKLVipXOaRhtsZJvaNiELO', '.ctor', 'WcKjEmIXNlXadilcqmLauzSXvHrXZxSlZ', 'JlEAKuzlbepEGlheqolAINakbWRTxXvom', 'pBGrzvtuSUwHahONhsPiKPWlDlcSGBHEmpeC'
          Source: 0.0.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.500000.0.unpack, MDXBuilderLibrary/mdx/customs.sap/XXeWeEglvjQktonzXhCTIjJiTcahnsNdq.csHigh entropy of concatenated method names: '.ctor', '.ctor', 'QURgdwyLfCIfiFZDfQgtUtZWWYZzkXSyeyri', 'QbZDkIDNcpEomWODPjXhrrdDnbGLChjImrT', 'GoPsvbRWwRIwWBjTDqmgbsigLLLeyLXOv', 'STIWOGXwVnvYBvxhgPIGhERDXdVyeQJJIGL', 'yZthNsErVZVYyqKzgCHGpqXUvKGNvUYBpR', 'voXffePzeOHqPGhyAuoZacDQWupKkRNajx', 'SBUURBBAVFruSFjpEJfUmwxzSuKJwbOYPgrk', 'ngeANWcCjSvhLbWOqlkGdpyyFHqZqBVAEv'
          Source: 0.0.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.500000.0.unpack, MDXBuilderLibrary/mdx/customs.sap/XFPcyOixxYugHBqLtySoJiQIRUtuezDVrZQ.csHigh entropy of concatenated method names: 'PyYpzdKsjrdgNgiQbFIJqsQYwlHFQJTaVmv', 'pHelfmkwACXpeglIPkBSKyVixwdSWBVeF', 'dXCpGbNnZULUQlwUojGiOqgRRCUAUbAtIbvg', 'CrbIuGShxeHphIZwjAtYzWdUhYkcqrHBuDl', 'QdIsQtNcJScnuDBRRsDVNOAExGNaRNQUEd', 'dPLqBGnivUzuUVVuQBOAyHmNiwZqWOokh', 'JAlDgJtdqlVUqTJaxQDKVPmiNVGCWsitxVA', 'hjBgqGWldQjKUoGcofuFnkOEkjRerdyue', 'qxeTROOsFopHDpZsiRBWwTHycICdrcarWGi'
          Source: dhcpmon.exe.3.dr, MDXBuilderLibrary/mdx/hYjztwlHalratuEEXrgEdjRuSEaXIDhor.csHigh entropy of concatenated method names: 'qfhRjEZoBmHHgAuEThlXpPUOCioHGubpjynu', 'qjsafFJQsqccTFnSJqIcimYDXAtNjzwwWkeN', 'uDEkyqWoXGysovpGfWgAujswYWYJKWRzEGnt', 'tTWuYDwPjgILtYSWzoAQOEUqJgdGdINjhRu', 'msyjRUfRlxCuBiscHvzcjREXDgEwOWVSuHT', 'kSQNgYPoETokzqwKLVipXOaRhtsZJvaNiELO', '.ctor', 'WcKjEmIXNlXadilcqmLauzSXvHrXZxSlZ', 'JlEAKuzlbepEGlheqolAINakbWRTxXvom', 'pBGrzvtuSUwHahONhsPiKPWlDlcSGBHEmpeC'
          Source: dhcpmon.exe.3.dr, MDXBuilderLibrary/mdx/customs.sap/XXeWeEglvjQktonzXhCTIjJiTcahnsNdq.csHigh entropy of concatenated method names: '.ctor', '.ctor', 'QURgdwyLfCIfiFZDfQgtUtZWWYZzkXSyeyri', 'QbZDkIDNcpEomWODPjXhrrdDnbGLChjImrT', 'GoPsvbRWwRIwWBjTDqmgbsigLLLeyLXOv', 'STIWOGXwVnvYBvxhgPIGhERDXdVyeQJJIGL', 'yZthNsErVZVYyqKzgCHGpqXUvKGNvUYBpR', 'voXffePzeOHqPGhyAuoZacDQWupKkRNajx', 'SBUURBBAVFruSFjpEJfUmwxzSuKJwbOYPgrk', 'ngeANWcCjSvhLbWOqlkGdpyyFHqZqBVAEv'
          Source: dhcpmon.exe.3.dr, MDXBuilderLibrary/mdx/customs.sap/XFPcyOixxYugHBqLtySoJiQIRUtuezDVrZQ.csHigh entropy of concatenated method names: 'PyYpzdKsjrdgNgiQbFIJqsQYwlHFQJTaVmv', 'pHelfmkwACXpeglIPkBSKyVixwdSWBVeF', 'dXCpGbNnZULUQlwUojGiOqgRRCUAUbAtIbvg', 'CrbIuGShxeHphIZwjAtYzWdUhYkcqrHBuDl', 'QdIsQtNcJScnuDBRRsDVNOAExGNaRNQUEd', 'dPLqBGnivUzuUVVuQBOAyHmNiwZqWOokh', 'JAlDgJtdqlVUqTJaxQDKVPmiNVGCWsitxVA', 'hjBgqGWldQjKUoGcofuFnkOEkjRerdyue', 'qxeTROOsFopHDpZsiRBWwTHycICdrcarWGi'
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeFile created: C:\Users\user\AppData\Roaming\hbVCUlv.exeJump to dropped file
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmp9381.tmp

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeFile opened: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe:Zone.Identifier read attributes | delete
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 9.2.hbVCUlv.exe.3731598.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e90000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.2ee1600.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.2b845cc.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.dhcpmon.exe.31715b8.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.307508938.0000000002B6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.318734843.0000000002ECA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.331266992.000000000371A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.314578400.0000000005E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.324082470.000000000315A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 1228, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 1900, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: hbVCUlv.exe PID: 6028, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4788, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 1228, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 1900, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: hbVCUlv.exe PID: 6028, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4788, type: MEMORYSTR
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.307508938.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000008.00000002.318734843.0000000002EA6000.00000004.00000800.00020000.00000000.sdmp, hbVCUlv.exe, 00000009.00000002.331266992.00000000036F6000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000D.00000002.324082470.0000000003136000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.349071481.0000000002836000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000000.00000002.307508938.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000008.00000002.318734843.0000000002EA6000.00000004.00000800.00020000.00000000.sdmp, hbVCUlv.exe, 00000009.00000002.331266992.00000000036F6000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000D.00000002.324082470.0000000003136000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.349071481.0000000002836000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe TID: 5020Thread sleep time: -57196s >= -30000s
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe TID: 5224Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe TID: 3000Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe TID: 6104Thread sleep time: -40000s >= -30000s
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe TID: 4440Thread sleep time: -57736s >= -30000s
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe TID: 6068Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exe TID: 4696Thread sleep time: -46876s >= -30000s
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exe TID: 3860Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe TID: 3292Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2160Thread sleep time: -55185s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2344Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1888Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exe TID: 3832Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2120Thread sleep time: -52766s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4440Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6044Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeWindow / User API: foregroundWindowGot 968
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_0544169A GetSystemInfo,
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeThread delayed: delay time: 57196
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeThread delayed: delay time: 57736
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeThread delayed: delay time: 46876
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 55185
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 52766
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: dhcpmon.exe, 00000014.00000002.349071481.0000000002836000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II,SOFTWARE\Microsoft\Windows Defender\Features
          Source: dhcpmon.exe, 00000014.00000002.349071481.0000000002836000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: dhcpmon.exe, 00000014.00000002.349071481.0000000002836000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: dhcpmon.exe, 00000014.00000002.349071481.0000000002836000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: dhcpmon.exe, 00000014.00000002.349071481.0000000002836000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
          Source: dhcpmon.exe, 00000014.00000002.349071481.0000000002836000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: dhcpmon.exe, 00000014.00000002.349071481.0000000002836000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: dhcpmon.exe, 00000014.00000002.349071481.0000000002836000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: dhcpmon.exe, 00000014.00000002.349071481.0000000002836000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.571610675.00000000010F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: dhcpmon.exe, 00000014.00000002.347724661.0000000000A91000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeMemory written: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeMemory written: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeMemory written: C:\Users\user\AppData\Roaming\hbVCUlv.exe base: 400000 value starts with: 4D5A
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 540000 value starts with: 4D5A
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmp9381.tmp
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpBC6A.tmp
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpBDD3.tmp
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmpA582.tmp
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeProcess created: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmp8DA5.tmp
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeProcess created: C:\Users\user\AppData\Roaming\hbVCUlv.exe C:\Users\user\AppData\Roaming\hbVCUlv.exe
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmpA776.tmp
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmpCABE.tmp
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000003.568357936.0000000001197000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managern has been aborted because of either a thread exit or an application request.
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000003.540573184.000000000118D000.00000004.00000020.00020000.00000000.sdmp, 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.573594094.000000000328D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager(
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000003.540573184.000000000118D000.00000004.00000020.00020000.00000000.sdmp, 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000003.568357936.0000000001191000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.573594094.000000000346B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager4F
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.571610675.00000000010F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager}
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 0_2_00E4BE16 GetUserNameW,
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
          Source: C:\Users\user\AppData\Roaming\hbVCUlv.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000008.00000002.317270185.000000000105D000.00000004.00000020.00020000.00000000.sdmp, hbVCUlv.exe, 00000009.00000002.329810050.000000000162C000.00000004.00000020.00020000.00000000.sdmp, hbVCUlv.exe, 00000009.00000002.329810050.0000000001609000.00000004.00000020.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.347724661.0000000000A4C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.46730c5.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e14629.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.4669c66.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.355128673.0000000003151000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.311567488.0000000003B31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.342518655.0000000003621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.342969185.0000000004621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.332550764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5724, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5244, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6088, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: hbVCUlv.exe PID: 1228, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.578951789.0000000005B70000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.578951789.0000000005B70000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.573594094.0000000003201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.573594094.0000000003201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 0000000C.00000002.342518655.0000000003621000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 0000000C.00000002.342518655.0000000003621000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 0000000C.00000002.342969185.0000000004621000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 0000000C.00000002.342969185.0000000004621000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe, 0000000C.00000002.332550764.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: dhcpmon.exe, 00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: dhcpmon.exe, 00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: hbVCUlv.exe, 00000013.00000002.355128673.0000000003151000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: hbVCUlv.exe, 00000013.00000002.355128673.0000000003151000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.46730c5.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e14629.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.466ea9c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.4669c66.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.3c1e2c0.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.355128673.0000000003151000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.311567488.0000000003B31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.342518655.0000000003621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.342969185.0000000004621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.332550764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5724, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe PID: 5244, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6088, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: hbVCUlv.exe PID: 1228, type: MEMORYSTR
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_05442D86 bind,
          Source: C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exeCode function: 3_2_05442D34 bind,
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Windows Management Instrumentation
          1
          Scheduled Task/Job
          1
          Access Token Manipulation
          1
          Disable or Modify Tools
          21
          Input Capture
          1
          Account Discovery
          Remote Services11
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Ingress Tool Transfer
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default Accounts1
          Scheduled Task/Job
          Boot or Logon Initialization Scripts112
          Process Injection
          1
          Deobfuscate/Decode Files or Information
          LSASS Memory1
          File and Directory Discovery
          Remote Desktop Protocol21
          Input Capture
          Exfiltration Over Bluetooth1
          Encrypted Channel
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)1
          Scheduled Task/Job
          2
          Obfuscated Files or Information
          Security Account Manager3
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
          Non-Standard Port
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)13
          Software Packing
          NTDS221
          Security Software Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer1
          Remote Access Software
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
          Masquerading
          LSA Secrets2
          Process Discovery
          SSHKeyloggingData Transfer Size Limits1
          Non-Application Layer Protocol
          Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common21
          Virtualization/Sandbox Evasion
          Cached Domain Credentials21
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureExfiltration Over C2 Channel21
          Application Layer Protocol
          Jamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items1
          Access Token Manipulation
          DCSync1
          Application Window Discovery
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job112
          Process Injection
          Proc Filesystem1
          System Owner/User Discovery
          Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
          Hidden Files and Directories
          /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 797493 Sample: 646B292F7A79327604DDFDB0F53... Startdate: 03/02/2023 Architecture: WINDOWS Score: 100 75 Snort IDS alert for network traffic 2->75 77 Malicious sample detected (through community Yara rule) 2->77 79 Antivirus detection for dropped file 2->79 81 15 other signatures 2->81 8 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe 7 2->8         started        12 hbVCUlv.exe 5 2->12         started        14 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe 4 2->14         started        16 2 other processes 2->16 process3 file4 63 C:\Users\user\AppData\Roaming\hbVCUlv.exe, PE32 8->63 dropped 65 C:\Users\user\...\hbVCUlv.exe:Zone.Identifier, ASCII 8->65 dropped 67 C:\Users\user\AppData\Local\...\tmp9381.tmp, XML 8->67 dropped 69 646B292F7A79327604...32E46DC86A9.exe.log, ASCII 8->69 dropped 85 Uses schtasks.exe or at.exe to add and modify task schedules 8->85 87 Injects a PE file into a foreign processes 8->87 18 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe 1 14 8->18         started        23 schtasks.exe 1 8->23         started        89 Antivirus detection for dropped file 12->89 91 Multi AV Scanner detection for dropped file 12->91 93 Machine Learning detection for dropped file 12->93 25 schtasks.exe 12->25         started        27 hbVCUlv.exe 12->27         started        29 schtasks.exe 1 14->29         started        31 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe 2 14->31         started        33 schtasks.exe 16->33         started        35 schtasks.exe 16->35         started        37 2 other processes 16->37 signatures5 process6 dnsIp7 71 brianbriano.ddns.net 184.105.237.195, 10001, 49696, 49697 RVBA2016US United States 18->71 73 127.0.0.1 unknown unknown 18->73 57 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->57 dropped 59 C:\Users\user\AppData\Roaming\...\run.dat, data 18->59 dropped 61 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->61 dropped 83 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->83 39 schtasks.exe 1 18->39         started        41 schtasks.exe 1 18->41         started        43 conhost.exe 23->43         started        45 conhost.exe 25->45         started        47 conhost.exe 29->47         started        49 conhost.exe 33->49         started        51 conhost.exe 35->51         started        file8 signatures9 process10 process11 53 conhost.exe 39->53         started        55 conhost.exe 41->55         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe82%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
          646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe74%VirustotalBrowse
          646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe100%AviraHEUR/AGEN.1202153
          646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\hbVCUlv.exe100%AviraHEUR/AGEN.1202153
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%AviraHEUR/AGEN.1202153
          C:\Users\user\AppData\Roaming\hbVCUlv.exe100%Joe Sandbox ML
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe82%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe74%VirustotalBrowse
          C:\Users\user\AppData\Roaming\hbVCUlv.exe82%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
          SourceDetectionScannerLabelLinkDownload
          12.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          3.2.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.5e10000.6.unpack100%AviraTR/NanoCore.fadteDownload File
          0.0.646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe.500000.0.unpack100%AviraHEUR/AGEN.1202153Download File
          SourceDetectionScannerLabelLink
          brianbriano.ddns.net4%VirustotalBrowse
          SourceDetectionScannerLabelLink
          127.0.0.10%Avira URL Cloudsafe
          brianbriano.ddns.net0%Avira URL Cloudsafe
          127.0.0.11%VirustotalBrowse
          brianbriano.ddns.net4%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          brianbriano.ddns.net
          184.105.237.195
          truetrueunknown
          NameMaliciousAntivirus DetectionReputation
          brianbriano.ddns.nettrue
          • 4%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          127.0.0.1true
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          184.105.237.195
          brianbriano.ddns.netUnited States
          395100RVBA2016UStrue
          IP
          127.0.0.1
          Joe Sandbox Version:36.0.0 Rainbow Opal
          Analysis ID:797493
          Start date and time:2023-02-03 00:26:06 +01:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 10m 7s
          Hypervisor based Inspection enabled:false
          Report type:light
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:29
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample file name:646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@36/16@11/2
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:Failed
          HCA Information:
          • Successful, ratio: 95%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
          • TCP Packets have been reduced to 100
          • Not all processes where analyzed, report is missing behavior information
          • Report creation exceeded maximum time and may have missing disassembly code information.
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size exceeded maximum capacity and may have missing disassembly code.
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          00:27:00API Interceptor845x Sleep call for process: 646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe modified
          00:27:02Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe" s>$(Arg0)
          00:27:03Task SchedulerRun new task: hbVCUlv path: C:\Users\user\AppData\Roaming\hbVCUlv.exe
          00:27:05Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
          00:27:05AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          00:27:07API Interceptor2x Sleep call for process: dhcpmon.exe modified
          00:27:08API Interceptor1x Sleep call for process: hbVCUlv.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Category:dropped
          Size (bytes):397312
          Entropy (8bit):7.9410139482036834
          Encrypted:false
          SSDEEP:6144:f3g6+/BLtz4FIRvUHGNid8tWDBtfctKnKlNSyPOYFq4vCwg8D3ICNiz4ypR42:Y6+/BLtvkGCuYqKifOYnFg8TIuizB
          MD5:E01A14ABC90ACECB1FE2ABA8D3ADB71F
          SHA1:1DBE3B0D1E76EEF6E1CD8C28E59A67B067EB6988
          SHA-256:646B292F7A79327604DDFDB0F535EE8D3832E46DC86A980986016FDBA3D64627
          SHA-512:F3A5374DEA5C38CE1DBDFDFC2607CBC6347C12A8A12D256636B4A0B4A83A4ACA03E1DE2EC4506F28DE962FD0CC2C916E7FDB86994566AC1865FBF4C60312077D
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: Joe Sandbox ML, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 82%
          • Antivirus: Virustotal, Detection: 74%, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......]............................n#... ........@.. ....................................@..................................#..W....@.......................`....................................................... ............... ..H............text...t.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................P#......H.......h...._..........XY...j...........................................0..k........r...p}.....r...p}.....r%..p}.....r7..p}.....rI..p}.....r[..p}.....rm..p}.....r...p}.....r...p}.....(.....*..0..t........(....&.....".".!.!....8...........#.#,...+..%..$.$,...+... ...... ......%.%,. ....+.. .........&.&,...X.+..........'.',...+..%..(.(,...+............).),....+..%...*.*,....+.............+.+,....+..%...,.,,....+.... ....... ......-.-,. ......+... .............,....X..+...
          Process:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):26
          Entropy (8bit):3.95006375643621
          Encrypted:false
          SSDEEP:3:ggPYV:rPYV
          MD5:187F488E27DB4AF347237FE461A079AD
          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
          Malicious:true
          Preview:[ZoneTransfer]....ZoneId=0
          Process:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          File Type:ASCII text, with CRLF line terminators
          Category:modified
          Size (bytes):655
          Entropy (8bit):5.273171405160065
          Encrypted:false
          SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0Ug+9Yz9t0U2ukyrFk70U2WUXBQav:MLF20NaL329hJ5g5z2p22rW29XBT
          MD5:03EBEB80A2ECD58DB99E84A9304352A3
          SHA1:D2C4D662AC774D29740474423B81D61E47B90995
          SHA-256:C8D208E1F41C7F58BC657B74A16F5BA0F496BFE31093D70252A0870CCFB93734
          SHA-512:ECDD31A6DA669E91EAD7E9685EDFE2F128C12280CFBE38135190A0D63291C827002996BFC70A9BD57790E466C4355242B985FA3E087FEA6F6AFAB6AFA6EE7AEE
          Malicious:true
          Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\4de99804c29261edb63c93616550f034\System.Management.ni.dll",0..
          Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):771
          Entropy (8bit):5.270465016990876
          Encrypted:false
          SSDEEP:24:MLF20NaL329hJ5g5z2p22rW29XBp2+g2+:MwLLG9h3gl2Y2rx9XBY+g2+
          MD5:3018D5969A55A0F1ADC29EAE9ED164BF
          SHA1:284FC77F7EF0ABDECE86BA01496D879BE71DE65C
          SHA-256:8F12BEC94AF00C112F34873CCA7FC7D85F9851B7ACFD2A20B079868C93078F89
          SHA-512:9E073D4B4F4CC713485235DB89DA06461AE051CACADFF2A4B916A7CBFC0A59CC542988D5530D9FFB28B7E9D98712EB653DB6A613EC1E47C53262AAEEA2C665FE
          Malicious:false
          Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\4de99804c29261edb63c93616550f034\System.Management.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\527c933194f3a99a816d83c619a3e1d3\System.Xml.ni.dll",0..
          Process:C:\Users\user\AppData\Roaming\hbVCUlv.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):655
          Entropy (8bit):5.273171405160065
          Encrypted:false
          SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0Ug+9Yz9t0U2ukyrFk70U2WUXBQav:MLF20NaL329hJ5g5z2p22rW29XBT
          MD5:03EBEB80A2ECD58DB99E84A9304352A3
          SHA1:D2C4D662AC774D29740474423B81D61E47B90995
          SHA-256:C8D208E1F41C7F58BC657B74A16F5BA0F496BFE31093D70252A0870CCFB93734
          SHA-512:ECDD31A6DA669E91EAD7E9685EDFE2F128C12280CFBE38135190A0D63291C827002996BFC70A9BD57790E466C4355242B985FA3E087FEA6F6AFAB6AFA6EE7AEE
          Malicious:false
          Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\4de99804c29261edb63c93616550f034\System.Management.ni.dll",0..
          Process:C:\Users\user\AppData\Roaming\hbVCUlv.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1640
          Entropy (8bit):5.179780179213497
          Encrypted:false
          SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGlOtn:cbhK79lNQR/rydbz9I3YODOLNdq3wo
          MD5:6022357E4EA537D40786932DE20A1358
          SHA1:19205EFC9A07988C786049A83E856E98DD4159B2
          SHA-256:B9769BCD55F8D8B8E1D476E2DC7DE95B0A60A049C011459AEEB6E20DCA577487
          SHA-512:9E962CDF6CFDB26F50C30746D376CCDA8969A0E3959B2164189EC979275587DE66BBF4AF0B7086FF4C957223E10250740C9C73D56299313546C6DD688F7CEB53
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
          Process:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1640
          Entropy (8bit):5.179780179213497
          Encrypted:false
          SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGlOtn:cbhK79lNQR/rydbz9I3YODOLNdq3wo
          MD5:6022357E4EA537D40786932DE20A1358
          SHA1:19205EFC9A07988C786049A83E856E98DD4159B2
          SHA-256:B9769BCD55F8D8B8E1D476E2DC7DE95B0A60A049C011459AEEB6E20DCA577487
          SHA-512:9E962CDF6CFDB26F50C30746D376CCDA8969A0E3959B2164189EC979275587DE66BBF4AF0B7086FF4C957223E10250740C9C73D56299313546C6DD688F7CEB53
          Malicious:true
          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
          Process:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1640
          Entropy (8bit):5.179780179213497
          Encrypted:false
          SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGlOtn:cbhK79lNQR/rydbz9I3YODOLNdq3wo
          MD5:6022357E4EA537D40786932DE20A1358
          SHA1:19205EFC9A07988C786049A83E856E98DD4159B2
          SHA-256:B9769BCD55F8D8B8E1D476E2DC7DE95B0A60A049C011459AEEB6E20DCA577487
          SHA-512:9E962CDF6CFDB26F50C30746D376CCDA8969A0E3959B2164189EC979275587DE66BBF4AF0B7086FF4C957223E10250740C9C73D56299313546C6DD688F7CEB53
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
          Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1640
          Entropy (8bit):5.179780179213497
          Encrypted:false
          SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGlOtn:cbhK79lNQR/rydbz9I3YODOLNdq3wo
          MD5:6022357E4EA537D40786932DE20A1358
          SHA1:19205EFC9A07988C786049A83E856E98DD4159B2
          SHA-256:B9769BCD55F8D8B8E1D476E2DC7DE95B0A60A049C011459AEEB6E20DCA577487
          SHA-512:9E962CDF6CFDB26F50C30746D376CCDA8969A0E3959B2164189EC979275587DE66BBF4AF0B7086FF4C957223E10250740C9C73D56299313546C6DD688F7CEB53
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
          Process:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1335
          Entropy (8bit):5.21334491153168
          Encrypted:false
          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0YJvxtn:cbk4oL600QydbQxIYODOLedq3dj
          MD5:5EFC0529B9E30CA47CD07FE32A116CE5
          SHA1:04BAE26926213546EFA3101E607830956E250965
          SHA-256:2ACF199A1C4E458BEDF6637C9AF392F46FE3E4A2C6B49DBA7225C423B66565F1
          SHA-512:221F4EE95FDC69793D6B215E2F26F18DB5798AFC07F21BFF5D5B5EA012D7D6BC9817E168385CA47FE325C1F05C8A586DA88A02A4780B3A3C2A0D3709349BFB5C
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
          Process:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:modified
          Size (bytes):1310
          Entropy (8bit):5.109425792877704
          Encrypted:false
          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
          MD5:5C2F41CFC6F988C859DA7D727AC2B62A
          SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
          SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
          SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
          Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1640
          Entropy (8bit):5.179780179213497
          Encrypted:false
          SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGlOtn:cbhK79lNQR/rydbz9I3YODOLNdq3wo
          MD5:6022357E4EA537D40786932DE20A1358
          SHA1:19205EFC9A07988C786049A83E856E98DD4159B2
          SHA-256:B9769BCD55F8D8B8E1D476E2DC7DE95B0A60A049C011459AEEB6E20DCA577487
          SHA-512:9E962CDF6CFDB26F50C30746D376CCDA8969A0E3959B2164189EC979275587DE66BBF4AF0B7086FF4C957223E10250740C9C73D56299313546C6DD688F7CEB53
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
          Process:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          File Type:data
          Category:dropped
          Size (bytes):8
          Entropy (8bit):3.0
          Encrypted:false
          SSDEEP:3:b:b
          MD5:53BCE1FE311D8C9EF524EAC0EA6B9223
          SHA1:74A39B5401D2AE234872ED096F95037DF103DD6D
          SHA-256:6C748A4D30923BADBF05144B5696150E66B08D5AE4BECAF530767DD6CC323C57
          SHA-512:77BC6062E9B4E1594A55785B1FFD50313196BE81E547F01949EA02869944697448294925FB6CD8931353798DC7BE14A7BB67A42C1D0180BD1B1E716EE0BBE9E9
          Malicious:true
          Preview:iN..t..H
          Process:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):72
          Entropy (8bit):4.62466971024535
          Encrypted:false
          SSDEEP:3:oNt+WfWTRTnbbQ7hhlVjQVJBkA:oNwvR3Q70Vl
          MD5:569EF1FFEF994FEA2DF27631236433B6
          SHA1:19550BC4046FB45E2A1894679B2C6DEA62C3BB58
          SHA-256:897465B24325FFF96F887BA14800AB111803B42FC267258D38145E9AC61B9B20
          SHA-512:7795B2B84233F9FACDA20365E4D7E9B0D0EED5EEA1522E6F977EFA52DE9551557D0AC2EA66E7AC12476B9D88084DEBC35DD2075CBC20392E76B85605D89FB2D0
          Malicious:false
          Preview:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Process:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Category:dropped
          Size (bytes):397312
          Entropy (8bit):7.9410139482036834
          Encrypted:false
          SSDEEP:6144:f3g6+/BLtz4FIRvUHGNid8tWDBtfctKnKlNSyPOYFq4vCwg8D3ICNiz4ypR42:Y6+/BLtvkGCuYqKifOYnFg8TIuizB
          MD5:E01A14ABC90ACECB1FE2ABA8D3ADB71F
          SHA1:1DBE3B0D1E76EEF6E1CD8C28E59A67B067EB6988
          SHA-256:646B292F7A79327604DDFDB0F535EE8D3832E46DC86A980986016FDBA3D64627
          SHA-512:F3A5374DEA5C38CE1DBDFDFC2607CBC6347C12A8A12D256636B4A0B4A83A4ACA03E1DE2EC4506F28DE962FD0CC2C916E7FDB86994566AC1865FBF4C60312077D
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: Joe Sandbox ML, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 82%
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......]............................n#... ........@.. ....................................@..................................#..W....@.......................`....................................................... ............... ..H............text...t.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................P#......H.......h...._..........XY...j...........................................0..k........r...p}.....r...p}.....r%..p}.....r7..p}.....rI..p}.....r[..p}.....rm..p}.....r...p}.....r...p}.....(.....*..0..t........(....&.....".".!.!....8...........#.#,...+..%..$.$,...+... ...... ......%.%,. ....+.. .........&.&,...X.+..........'.',...+..%..(.(,...+............).),....+..%...*.*,....+.............+.+,....+..%...,.,,....+.... ....... ......-.-,. ......+... .............,....X..+...
          Process:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):26
          Entropy (8bit):3.95006375643621
          Encrypted:false
          SSDEEP:3:ggPYV:rPYV
          MD5:187F488E27DB4AF347237FE461A079AD
          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
          Malicious:true
          Preview:[ZoneTransfer]....ZoneId=0
          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):7.9410139482036834
          TrID:
          • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
          • Win32 Executable (generic) a (10002005/4) 49.97%
          • Generic Win/DOS Executable (2004/3) 0.01%
          • DOS Executable Generic (2002/1) 0.01%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          File size:397312
          MD5:e01a14abc90acecb1fe2aba8d3adb71f
          SHA1:1dbe3b0d1e76eef6e1cd8c28e59a67b067eb6988
          SHA256:646b292f7a79327604ddfdb0f535ee8d3832e46dc86a980986016fdba3d64627
          SHA512:f3a5374dea5c38ce1dbdfdfc2607cbc6347c12a8a12d256636b4a0b4a83a4aca03e1de2ec4506f28de962fd0cc2c916e7fdb86994566ac1865fbf4c60312077d
          SSDEEP:6144:f3g6+/BLtz4FIRvUHGNid8tWDBtfctKnKlNSyPOYFq4vCwg8D3ICNiz4ypR42:Y6+/BLtvkGCuYqKifOYnFg8TIuizB
          TLSH:1F8412017718E795D38CA7F8AA74626C4371B6A81932F32F4C6B30E7D563BE2472185B
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......]............................n#... ........@.. ....................................@................................
          Icon Hash:00828e8e8686b000
          Entrypoint:0x46236e
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0x5DC20BC4 [Tue Nov 5 23:54:44 2019 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
          Instruction
          jmp dword ptr [00402000h]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x623140x57.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x640000x800.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x660000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000x603740x60400False0.9524173092532467data7.954638266049198IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rsrc0x640000x8000x800False0.32958984375data3.450513412054433IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x660000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          RT_VERSION0x640900x37cdata
          RT_MANIFEST0x6441c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
          DLLImport
          mscoree.dll_CorExeMain
          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
          192.168.2.4184.105.237.19549710100012025019 02/03/23-00:28:31.654776TCP2025019ET TROJAN Possible NanoCore C2 60B4971010001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549710100012816766 02/03/23-00:28:33.834752TCP2816766ETPRO TROJAN NanoCore RAT CnC 74971010001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549696100012025019 02/03/23-00:27:05.348657TCP2025019ET TROJAN Possible NanoCore C2 60B4969610001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549714100012025019 02/03/23-00:28:55.473039TCP2025019ET TROJAN Possible NanoCore C2 60B4971410001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549703100012025019 02/03/23-00:27:48.578100TCP2025019ET TROJAN Possible NanoCore C2 60B4970310001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549697100012025019 02/03/23-00:27:11.697985TCP2025019ET TROJAN Possible NanoCore C2 60B4969710001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549698100012025019 02/03/23-00:27:19.121500TCP2025019ET TROJAN Possible NanoCore C2 60B4969810001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549709100012025019 02/03/23-00:28:24.651689TCP2025019ET TROJAN Possible NanoCore C2 60B4970910001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549702100012025019 02/03/23-00:27:42.402353TCP2025019ET TROJAN Possible NanoCore C2 60B4970210001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549698100012816766 02/03/23-00:27:21.094469TCP2816766ETPRO TROJAN NanoCore RAT CnC 74969810001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549715100012816766 02/03/23-00:29:05.373729TCP2816766ETPRO TROJAN NanoCore RAT CnC 74971510001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549697100012816766 02/03/23-00:27:13.460347TCP2816766ETPRO TROJAN NanoCore RAT CnC 74969710001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549708100012025019 02/03/23-00:28:17.926799TCP2025019ET TROJAN Possible NanoCore C2 60B4970810001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549696100012816766 02/03/23-00:27:07.112967TCP2816766ETPRO TROJAN NanoCore RAT CnC 74969610001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549703100012816766 02/03/23-00:27:50.380926TCP2816766ETPRO TROJAN NanoCore RAT CnC 74970310001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549714100012816766 02/03/23-00:28:58.124908TCP2816766ETPRO TROJAN NanoCore RAT CnC 74971410001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549704100012816766 02/03/23-00:27:57.519906TCP2816766ETPRO TROJAN NanoCore RAT CnC 74970410001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549708100012816766 02/03/23-00:28:19.942981TCP2816766ETPRO TROJAN NanoCore RAT CnC 74970810001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549709100012816766 02/03/23-00:28:26.847077TCP2816766ETPRO TROJAN NanoCore RAT CnC 74970910001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549697100012816718 02/03/23-00:27:12.093478TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon4969710001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549704100012025019 02/03/23-00:27:55.553197TCP2025019ET TROJAN Possible NanoCore C2 60B4970410001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549715100012025019 02/03/23-00:29:04.002318TCP2025019ET TROJAN Possible NanoCore C2 60B4971510001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549702100012816766 02/03/23-00:27:44.172937TCP2816766ETPRO TROJAN NanoCore RAT CnC 74970210001192.168.2.4184.105.237.195
          192.168.2.4184.105.237.19549708100012816718 02/03/23-00:28:19.942981TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon4970810001192.168.2.4184.105.237.195
          TimestampSource PortDest PortSource IPDest IP
          Feb 3, 2023 00:27:05.013998985 CET4969610001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:05.208734035 CET1000149696184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:05.208848000 CET4969610001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:05.348656893 CET4969610001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:05.544926882 CET1000149696184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:05.545007944 CET4969610001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:05.741916895 CET1000149696184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:05.742041111 CET4969610001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:05.937634945 CET1000149696184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:05.938749075 CET4969610001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:06.132921934 CET1000149696184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:06.133028030 CET4969610001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:06.326924086 CET1000149696184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:06.327065945 CET4969610001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:06.522933006 CET1000149696184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:06.523025990 CET4969610001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:06.719455957 CET1000149696184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:06.719588995 CET4969610001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:06.916315079 CET1000149696184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:06.916836023 CET4969610001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:07.112868071 CET1000149696184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:07.112967014 CET4969610001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:07.275751114 CET4969610001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:07.307995081 CET1000149696184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:07.308048010 CET4969610001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:11.500554085 CET4969710001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:11.697468996 CET1000149697184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:11.697550058 CET4969710001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:11.697984934 CET4969710001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:11.894057035 CET1000149697184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:11.895531893 CET4969710001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:12.093377113 CET1000149697184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:12.093477964 CET4969710001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:12.288959026 CET1000149697184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:12.289061069 CET4969710001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:12.483809948 CET1000149697184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:12.484217882 CET4969710001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:12.678292990 CET1000149697184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:12.678432941 CET4969710001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:12.872711897 CET1000149697184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:12.875804901 CET4969710001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:13.070967913 CET1000149697184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:13.071103096 CET4969710001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:13.265883923 CET1000149697184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:13.265960932 CET4969710001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:13.460284948 CET1000149697184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:13.460346937 CET4969710001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:13.603579044 CET4969710001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:13.654912949 CET1000149697184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:13.655096054 CET4969710001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:18.835866928 CET4969810001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:19.029932022 CET1000149698184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:19.033951998 CET4969810001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:19.121500015 CET4969810001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:19.315598965 CET1000149698184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:19.317471027 CET4969810001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:19.511491060 CET1000149698184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:19.529211998 CET4969810001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:19.723428965 CET1000149698184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:19.725918055 CET4969810001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:19.919888973 CET1000149698184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:19.921041012 CET4969810001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:20.116961002 CET1000149698184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:20.117067099 CET4969810001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:20.311744928 CET1000149698184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:20.312031031 CET4969810001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:20.508069992 CET1000149698184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:20.508608103 CET4969810001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:20.702568054 CET1000149698184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:20.706109047 CET4969810001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:20.900022030 CET1000149698184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:20.900327921 CET4969810001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:21.094309092 CET1000149698184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:21.094469070 CET4969810001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:21.107709885 CET4969810001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:21.288347006 CET1000149698184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:21.288449049 CET4969810001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:42.206159115 CET4970210001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:42.401283979 CET1000149702184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:42.401417971 CET4970210001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:42.402353048 CET4970210001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:42.597618103 CET1000149702184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:42.597693920 CET4970210001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:42.793983936 CET1000149702184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:42.794060946 CET4970210001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:42.989381075 CET1000149702184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:42.989494085 CET4970210001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:43.186486959 CET1000149702184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:43.187222958 CET4970210001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:43.382625103 CET1000149702184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:43.383800983 CET4970210001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:43.581367970 CET1000149702184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:43.582508087 CET4970210001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:43.777828932 CET1000149702184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:43.778004885 CET4970210001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:43.973201036 CET1000149702184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:43.976073980 CET4970210001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:44.172787905 CET1000149702184.105.237.195192.168.2.4
          Feb 3, 2023 00:27:44.172936916 CET4970210001192.168.2.4184.105.237.195
          Feb 3, 2023 00:27:44.264945030 CET4970210001192.168.2.4184.105.237.195
          TimestampSource PortDest PortSource IPDest IP
          Feb 3, 2023 00:27:04.961555958 CET5091153192.168.2.48.8.8.8
          Feb 3, 2023 00:27:04.984492064 CET53509118.8.8.8192.168.2.4
          Feb 3, 2023 00:27:11.474503994 CET5968353192.168.2.48.8.8.8
          Feb 3, 2023 00:27:11.495126963 CET53596838.8.8.8192.168.2.4
          Feb 3, 2023 00:27:18.814075947 CET6416753192.168.2.48.8.8.8
          Feb 3, 2023 00:27:18.833225965 CET53641678.8.8.8192.168.2.4
          Feb 3, 2023 00:27:42.185161114 CET5856553192.168.2.48.8.8.8
          Feb 3, 2023 00:27:42.204382896 CET53585658.8.8.8192.168.2.4
          Feb 3, 2023 00:27:48.357934952 CET5223953192.168.2.48.8.8.8
          Feb 3, 2023 00:27:48.379580975 CET53522398.8.8.8192.168.2.4
          Feb 3, 2023 00:27:55.328177929 CET5680753192.168.2.48.8.8.8
          Feb 3, 2023 00:27:55.347703934 CET53568078.8.8.8192.168.2.4
          Feb 3, 2023 00:28:17.707776070 CET6100753192.168.2.48.8.8.8
          Feb 3, 2023 00:28:17.729979992 CET53610078.8.8.8192.168.2.4
          Feb 3, 2023 00:28:24.433948994 CET6068653192.168.2.48.8.8.8
          Feb 3, 2023 00:28:24.454770088 CET53606868.8.8.8192.168.2.4
          Feb 3, 2023 00:28:31.434386969 CET6112453192.168.2.48.8.8.8
          Feb 3, 2023 00:28:31.456299067 CET53611248.8.8.8192.168.2.4
          Feb 3, 2023 00:28:55.255594969 CET5944453192.168.2.48.8.8.8
          Feb 3, 2023 00:28:55.274615049 CET53594448.8.8.8192.168.2.4
          Feb 3, 2023 00:29:03.759879112 CET5557053192.168.2.48.8.8.8
          Feb 3, 2023 00:29:03.778939962 CET53555708.8.8.8192.168.2.4
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Feb 3, 2023 00:27:04.961555958 CET192.168.2.48.8.8.80x88a5Standard query (0)brianbriano.ddns.netA (IP address)IN (0x0001)false
          Feb 3, 2023 00:27:11.474503994 CET192.168.2.48.8.8.80x6c59Standard query (0)brianbriano.ddns.netA (IP address)IN (0x0001)false
          Feb 3, 2023 00:27:18.814075947 CET192.168.2.48.8.8.80x18c9Standard query (0)brianbriano.ddns.netA (IP address)IN (0x0001)false
          Feb 3, 2023 00:27:42.185161114 CET192.168.2.48.8.8.80xcd7eStandard query (0)brianbriano.ddns.netA (IP address)IN (0x0001)false
          Feb 3, 2023 00:27:48.357934952 CET192.168.2.48.8.8.80x388dStandard query (0)brianbriano.ddns.netA (IP address)IN (0x0001)false
          Feb 3, 2023 00:27:55.328177929 CET192.168.2.48.8.8.80xe574Standard query (0)brianbriano.ddns.netA (IP address)IN (0x0001)false
          Feb 3, 2023 00:28:17.707776070 CET192.168.2.48.8.8.80x7f0bStandard query (0)brianbriano.ddns.netA (IP address)IN (0x0001)false
          Feb 3, 2023 00:28:24.433948994 CET192.168.2.48.8.8.80x426eStandard query (0)brianbriano.ddns.netA (IP address)IN (0x0001)false
          Feb 3, 2023 00:28:31.434386969 CET192.168.2.48.8.8.80x95d5Standard query (0)brianbriano.ddns.netA (IP address)IN (0x0001)false
          Feb 3, 2023 00:28:55.255594969 CET192.168.2.48.8.8.80xfc9fStandard query (0)brianbriano.ddns.netA (IP address)IN (0x0001)false
          Feb 3, 2023 00:29:03.759879112 CET192.168.2.48.8.8.80x7eddStandard query (0)brianbriano.ddns.netA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Feb 3, 2023 00:27:04.984492064 CET8.8.8.8192.168.2.40x88a5No error (0)brianbriano.ddns.net184.105.237.195A (IP address)IN (0x0001)false
          Feb 3, 2023 00:27:11.495126963 CET8.8.8.8192.168.2.40x6c59No error (0)brianbriano.ddns.net184.105.237.195A (IP address)IN (0x0001)false
          Feb 3, 2023 00:27:18.833225965 CET8.8.8.8192.168.2.40x18c9No error (0)brianbriano.ddns.net184.105.237.195A (IP address)IN (0x0001)false
          Feb 3, 2023 00:27:42.204382896 CET8.8.8.8192.168.2.40xcd7eNo error (0)brianbriano.ddns.net184.105.237.195A (IP address)IN (0x0001)false
          Feb 3, 2023 00:27:48.379580975 CET8.8.8.8192.168.2.40x388dNo error (0)brianbriano.ddns.net184.105.237.195A (IP address)IN (0x0001)false
          Feb 3, 2023 00:27:55.347703934 CET8.8.8.8192.168.2.40xe574No error (0)brianbriano.ddns.net184.105.237.195A (IP address)IN (0x0001)false
          Feb 3, 2023 00:28:17.729979992 CET8.8.8.8192.168.2.40x7f0bNo error (0)brianbriano.ddns.net184.105.237.195A (IP address)IN (0x0001)false
          Feb 3, 2023 00:28:24.454770088 CET8.8.8.8192.168.2.40x426eNo error (0)brianbriano.ddns.net184.105.237.195A (IP address)IN (0x0001)false
          Feb 3, 2023 00:28:31.456299067 CET8.8.8.8192.168.2.40x95d5No error (0)brianbriano.ddns.net184.105.237.195A (IP address)IN (0x0001)false
          Feb 3, 2023 00:28:55.274615049 CET8.8.8.8192.168.2.40xfc9fNo error (0)brianbriano.ddns.net184.105.237.195A (IP address)IN (0x0001)false
          Feb 3, 2023 00:29:03.778939962 CET8.8.8.8192.168.2.40x7eddNo error (0)brianbriano.ddns.net184.105.237.195A (IP address)IN (0x0001)false

          Click to jump to process

          Target ID:0
          Start time:00:26:58
          Start date:03/02/2023
          Path:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Imagebase:0x500000
          File size:397312 bytes
          MD5 hash:E01A14ABC90ACECB1FE2ABA8D3ADB71F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_CassandraCrypter, Description: Yara detected Cassandra Crypter, Source: 00000000.00000002.307508938.0000000002B6A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: SUSP_NET_NAME_ConfuserEx, Description: Detects ConfuserEx packed file, Source: 00000000.00000002.314033178.00000000051D0000.00000004.08000000.00040000.00000000.sdmp, Author: Arnim Rupp
          • Rule: INDICATOR_EXE_Packed_Cassandra, Description: Detects executables packed with Cassandra/CyaX, Source: 00000000.00000002.314033178.00000000051D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.311567488.0000000003B31000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.311567488.0000000003B31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.311567488.0000000003B31000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.311567488.0000000003B31000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_CassandraCrypter, Description: Yara detected Cassandra Crypter, Source: 00000000.00000002.314578400.0000000005E90000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: INDICATOR_EXE_Packed_Cassandra, Description: Detects executables packed with Cassandra/CyaX, Source: 00000000.00000002.314578400.0000000005E90000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
          Reputation:low

          Target ID:1
          Start time:00:27:00
          Start date:03/02/2023
          Path:C:\Windows\SysWOW64\schtasks.exe
          Wow64 process (32bit):true
          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmp9381.tmp
          Imagebase:0xcc0000
          File size:185856 bytes
          MD5 hash:15FF7D8324231381BAD48A052F85DF04
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:2
          Start time:00:27:00
          Start date:03/02/2023
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7c72c0000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:3
          Start time:00:27:01
          Start date:03/02/2023
          Path:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Imagebase:0x9c0000
          File size:397312 bytes
          MD5 hash:E01A14ABC90ACECB1FE2ABA8D3ADB71F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.578951789.0000000005B70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.578951789.0000000005B70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.578951789.0000000005B70000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.578951789.0000000005B70000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.573594094.0000000003201000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.579080815.0000000005E10000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
          Reputation:low

          Target ID:4
          Start time:00:27:02
          Start date:03/02/2023
          Path:C:\Windows\SysWOW64\schtasks.exe
          Wow64 process (32bit):true
          Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpBC6A.tmp
          Imagebase:0xcc0000
          File size:185856 bytes
          MD5 hash:15FF7D8324231381BAD48A052F85DF04
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:5
          Start time:00:27:02
          Start date:03/02/2023
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7c72c0000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:6
          Start time:00:27:02
          Start date:03/02/2023
          Path:C:\Windows\SysWOW64\schtasks.exe
          Wow64 process (32bit):true
          Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpBDD3.tmp
          Imagebase:0xcc0000
          File size:185856 bytes
          MD5 hash:15FF7D8324231381BAD48A052F85DF04
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:7
          Start time:00:27:02
          Start date:03/02/2023
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7c72c0000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:8
          Start time:00:27:02
          Start date:03/02/2023
          Path:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe 0
          Imagebase:0x820000
          File size:397312 bytes
          MD5 hash:E01A14ABC90ACECB1FE2ABA8D3ADB71F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_CassandraCrypter, Description: Yara detected Cassandra Crypter, Source: 00000008.00000002.318734843.0000000002ECA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          Reputation:low

          Target ID:9
          Start time:00:27:03
          Start date:03/02/2023
          Path:C:\Users\user\AppData\Roaming\hbVCUlv.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\AppData\Roaming\hbVCUlv.exe
          Imagebase:0xf30000
          File size:397312 bytes
          MD5 hash:E01A14ABC90ACECB1FE2ABA8D3ADB71F
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_CassandraCrypter, Description: Yara detected Cassandra Crypter, Source: 00000009.00000002.331266992.000000000371A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          Antivirus matches:
          • Detection: 100%, Avira
          • Detection: 100%, Joe Sandbox ML
          • Detection: 82%, ReversingLabs

          Target ID:10
          Start time:00:27:04
          Start date:03/02/2023
          Path:C:\Windows\SysWOW64\schtasks.exe
          Wow64 process (32bit):true
          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmpA582.tmp
          Imagebase:0xcc0000
          File size:185856 bytes
          MD5 hash:15FF7D8324231381BAD48A052F85DF04
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:11
          Start time:00:27:04
          Start date:03/02/2023
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7c72c0000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:12
          Start time:00:27:05
          Start date:03/02/2023
          Path:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\646B292F7A79327604DDFDB0F535EE8D3832E46DC86A9.exe
          Imagebase:0xf70000
          File size:397312 bytes
          MD5 hash:E01A14ABC90ACECB1FE2ABA8D3ADB71F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.342518655.0000000003621000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.342518655.0000000003621000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000C.00000002.342518655.0000000003621000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.342969185.0000000004621000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.342969185.0000000004621000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000C.00000002.342969185.0000000004621000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.332550764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.332550764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.332550764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000C.00000002.332550764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown

          Target ID:13
          Start time:00:27:05
          Start date:03/02/2023
          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Wow64 process (32bit):true
          Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
          Imagebase:0xb10000
          File size:397312 bytes
          MD5 hash:E01A14ABC90ACECB1FE2ABA8D3ADB71F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_CassandraCrypter, Description: Yara detected Cassandra Crypter, Source: 0000000D.00000002.324082470.000000000315A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          Antivirus matches:
          • Detection: 100%, Avira
          • Detection: 100%, Joe Sandbox ML
          • Detection: 82%, ReversingLabs
          • Detection: 74%, Virustotal, Browse

          Target ID:14
          Start time:00:27:07
          Start date:03/02/2023
          Path:C:\Windows\SysWOW64\schtasks.exe
          Wow64 process (32bit):true
          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmpA776.tmp
          Imagebase:0xcc0000
          File size:185856 bytes
          MD5 hash:15FF7D8324231381BAD48A052F85DF04
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:15
          Start time:00:27:07
          Start date:03/02/2023
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7c72c0000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:16
          Start time:00:27:08
          Start date:03/02/2023
          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Wow64 process (32bit):true
          Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Imagebase:0x110000
          File size:397312 bytes
          MD5 hash:E01A14ABC90ACECB1FE2ABA8D3ADB71F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000010.00000002.343692976.0000000002801000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

          Target ID:17
          Start time:00:27:10
          Start date:03/02/2023
          Path:C:\Windows\SysWOW64\schtasks.exe
          Wow64 process (32bit):true
          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmp8DA5.tmp
          Imagebase:0xcc0000
          File size:185856 bytes
          MD5 hash:15FF7D8324231381BAD48A052F85DF04
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language

          Target ID:18
          Start time:00:27:10
          Start date:03/02/2023
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7c72c0000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language

          Target ID:19
          Start time:00:27:11
          Start date:03/02/2023
          Path:C:\Users\user\AppData\Roaming\hbVCUlv.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\AppData\Roaming\hbVCUlv.exe
          Imagebase:0xa20000
          File size:397312 bytes
          MD5 hash:E01A14ABC90ACECB1FE2ABA8D3ADB71F
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.355128673.0000000003151000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.355128673.0000000003151000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.355128673.0000000003151000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

          Target ID:20
          Start time:00:27:13
          Start date:03/02/2023
          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Wow64 process (32bit):true
          Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
          Imagebase:0x200000
          File size:397312 bytes
          MD5 hash:E01A14ABC90ACECB1FE2ABA8D3ADB71F
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:.Net C# or VB.NET

          Target ID:21
          Start time:00:27:19
          Start date:03/02/2023
          Path:C:\Windows\SysWOW64\schtasks.exe
          Wow64 process (32bit):true
          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hbVCUlv" /XML "C:\Users\user\AppData\Local\Temp\tmpCABE.tmp
          Imagebase:0xcc0000
          File size:185856 bytes
          MD5 hash:15FF7D8324231381BAD48A052F85DF04
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language

          Target ID:22
          Start time:00:27:19
          Start date:03/02/2023
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7c72c0000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language

          Target ID:23
          Start time:00:27:19
          Start date:03/02/2023
          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Wow64 process (32bit):true
          Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Imagebase:0x770000
          File size:397312 bytes
          MD5 hash:E01A14ABC90ACECB1FE2ABA8D3ADB71F
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:.Net C# or VB.NET

          No disassembly