Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
lb64Iy4W4e.exe

Overview

General Information

Sample Name:lb64Iy4W4e.exe
Analysis ID:799403
MD5:4c7df43e37814754ad1c8a97ab971af8
SHA1:c2315cba4dc175554869cf1c7d7b4ddfdb65adea
SHA256:49cc6f25d16cf7c85d218bcd4ecbdedce0f5d4540bc5099436511291f48a3976
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Maps a DLL or memory area into another process
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses dynamic DNS services
Uses 32bit PE files
Yara signature match
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops PE files
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Found large amount of non-executed APIs
Contains functionality to delete services
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • lb64Iy4W4e.exe (PID: 4332 cmdline: C:\Users\user\Desktop\lb64Iy4W4e.exe MD5: 4C7DF43E37814754AD1C8A97AB971AF8)
    • tohjyweui.exe (PID: 5884 cmdline: "C:\Users\user\AppData\Local\Temp\tohjyweui.exe" C:\Users\user\AppData\Local\Temp\fwbfw.c MD5: 64517EEC55E1F3C392B63B73D833E5F9)
      • tohjyweui.exe (PID: 4560 cmdline: C:\Users\user\AppData\Local\Temp\tohjyweui.exe MD5: 64517EEC55E1F3C392B63B73D833E5F9)
  • tpyienirbwgp.exe (PID: 5716 cmdline: "C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exe" "C:\Users\user\AppData\Local\Temp\tohjyweui.exe" C:\Users\user\A MD5: 64517EEC55E1F3C392B63B73D833E5F9)
    • WerFault.exe (PID: 5420 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5716 -s 632 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • tpyienirbwgp.exe (PID: 5408 cmdline: "C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exe" "C:\Users\user\AppData\Local\Temp\tohjyweui.exe" C:\Users\user\A MD5: 64517EEC55E1F3C392B63B73D833E5F9)
    • WerFault.exe (PID: 4032 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5408 -s 604 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "d046c01c-51f5-4c8c-b5b9-b566d533", "Group": "", "Domain1": "alertt.duckdns.org", "Domain2": "alertt.duckdns.org", "Port": 6445, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0x237e5:$x1: NanoCore.ClientPluginHost
  • 0x23822:$x2: IClientNetworkHost
  • 0x27355:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
  • 0x2355d:$x1: NanoCore Client.exe
  • 0x237e5:$x2: NanoCore.ClientPluginHost
  • 0x24e1e:$s1: PluginCommand
  • 0x24e12:$s2: FileCommand
  • 0x25cc3:$s3: PipeExists
  • 0x2ba7a:$s4: PipeCreated
  • 0x2380f:$s5: IClientLoggingHost
00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0x2354d:$x1: NanoCore Client
    • 0x2355d:$x1: NanoCore Client
    • 0x237a5:$x2: NanoCore.ClientPlugin
    • 0x237e5:$x3: NanoCore.ClientPluginHost
    • 0x2379a:$i1: IClientApp
    • 0x237bb:$i2: IClientData
    • 0x237c7:$i3: IClientNetwork
    • 0x237d6:$i4: IClientAppHost
    • 0x237ff:$i5: IClientDataHost
    • 0x2380f:$i6: IClientLoggingHost
    • 0x23822:$i7: IClientNetworkHost
    • 0x23835:$i8: IClientUIHost
    • 0x23843:$i9: IClientNameObjectCollection
    • 0x2385f:$i10: IClientReadOnlyNameObjectCollection
    • 0x235ac:$s1: ClientPlugin
    • 0x237ae:$s1: ClientPlugin
    • 0x23ca2:$s2: EndPoint
    • 0x23cab:$s3: IPAddress
    • 0x23cb5:$s4: IPEndPoint
    • 0x256eb:$s6: get_ClientSettings
    • 0x25c8f:$s7: get_Connected
    00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x2354d:$a: NanoCore
    • 0x2355d:$a: NanoCore
    • 0x23791:$a: NanoCore
    • 0x237a5:$a: NanoCore
    • 0x237e5:$a: NanoCore
    • 0x235ac:$b: ClientPlugin
    • 0x237ae:$b: ClientPlugin
    • 0x237ee:$b: ClientPlugin
    • 0x236d3:$c: ProjectData
    • 0x240da:$d: DESCrypto
    • 0x2baa6:$e: KeepAlive
    • 0x29a94:$g: LogClientMessage
    • 0x25c8f:$i: get_Connected
    • 0x24410:$j: #=q
    • 0x24440:$j: #=q
    • 0x2445c:$j: #=q
    • 0x2448c:$j: #=q
    • 0x244a8:$j: #=q
    • 0x244c4:$j: #=q
    • 0x244f4:$j: #=q
    • 0x24510:$j: #=q
    Click to see the 5 entries
    SourceRuleDescriptionAuthorStrings
    1.2.tohjyweui.exe.643658.1.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    1.2.tohjyweui.exe.643658.1.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
    • 0xff05:$x1: NanoCore Client.exe
    • 0x1018d:$x2: NanoCore.ClientPluginHost
    • 0x117c6:$s1: PluginCommand
    • 0x117ba:$s2: FileCommand
    • 0x1266b:$s3: PipeExists
    • 0x18422:$s4: PipeCreated
    • 0x101b7:$s5: IClientLoggingHost
    1.2.tohjyweui.exe.643658.1.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      1.2.tohjyweui.exe.643658.1.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xfef5:$x1: NanoCore Client
      • 0xff05:$x1: NanoCore Client
      • 0x1014d:$x2: NanoCore.ClientPlugin
      • 0x1018d:$x3: NanoCore.ClientPluginHost
      • 0x10142:$i1: IClientApp
      • 0x10163:$i2: IClientData
      • 0x1016f:$i3: IClientNetwork
      • 0x1017e:$i4: IClientAppHost
      • 0x101a7:$i5: IClientDataHost
      • 0x101b7:$i6: IClientLoggingHost
      • 0x101ca:$i7: IClientNetworkHost
      • 0x101dd:$i8: IClientUIHost
      • 0x101eb:$i9: IClientNameObjectCollection
      • 0x10207:$i10: IClientReadOnlyNameObjectCollection
      • 0xff54:$s1: ClientPlugin
      • 0x10156:$s1: ClientPlugin
      • 0x1064a:$s2: EndPoint
      • 0x10653:$s3: IPAddress
      • 0x1065d:$s4: IPEndPoint
      • 0x12093:$s6: get_ClientSettings
      • 0x12637:$s7: get_Connected
      1.2.tohjyweui.exe.643658.1.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x1007b:$c: ProjectData
      • 0x10a82:$d: DESCrypto
      • 0x1844e:$e: KeepAlive
      • 0x1643c:$g: LogClientMessage
      • 0x12637:$i: get_Connected
      • 0x10db8:$j: #=q
      • 0x10de8:$j: #=q
      • 0x10e04:$j: #=q
      • 0x10e34:$j: #=q
      • 0x10e50:$j: #=q
      • 0x10e6c:$j: #=q
      • 0x10e9c:$j: #=q
      • 0x10eb8:$j: #=q
      Click to see the 19 entries

      AV Detection

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\tohjyweui.exe, ProcessId: 4560, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\tohjyweui.exe, ProcessId: 4560, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Stealing of Sensitive Information

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\tohjyweui.exe, ProcessId: 4560, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\tohjyweui.exe, ProcessId: 4560, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Timestamp:192.168.2.545.132.106.374971264452816766 02/06/23-14:12:55.395066
      SID:2816766
      Source Port:49712
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497312841753 02/06/23-14:13:52.517965
      SID:2841753
      Source Port:6445
      Destination Port:49731
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374970964452816766 02/06/23-14:12:39.702248
      SID:2816766
      Source Port:49709
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497072841753 02/06/23-14:12:33.506820
      SID:2841753
      Source Port:6445
      Destination Port:49707
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374973564452816766 02/06/23-14:14:08.694757
      SID:2816766
      Source Port:49735
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497202841753 02/06/23-14:13:12.771040
      SID:2841753
      Source Port:6445
      Destination Port:49720
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374972964452816766 02/06/23-14:13:42.328059
      SID:2816766
      Source Port:49729
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374970264452816766 02/06/23-14:12:20.468192
      SID:2816766
      Source Port:49702
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497252841753 02/06/23-14:13:29.137140
      SID:2841753
      Source Port:6445
      Destination Port:49725
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374971164452823337 02/06/23-14:12:50.979729
      SID:2823337
      Source Port:49711
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497202810451 02/06/23-14:13:12.771040
      SID:2810451
      Source Port:6445
      Destination Port:49720
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497332841753 02/06/23-14:13:57.153095
      SID:2841753
      Source Port:6445
      Destination Port:49733
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497352841753 02/06/23-14:14:08.617792
      SID:2841753
      Source Port:6445
      Destination Port:49735
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497362841753 02/06/23-14:14:13.470154
      SID:2841753
      Source Port:6445
      Destination Port:49736
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374972264452816766 02/06/23-14:13:18.836838
      SID:2816766
      Source Port:49722
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374971664452816766 02/06/23-14:12:59.871071
      SID:2816766
      Source Port:49716
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374970364452816766 02/06/23-14:12:29.256960
      SID:2816766
      Source Port:49703
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374972664452816766 02/06/23-14:13:33.513858
      SID:2816766
      Source Port:49726
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497272841753 02/06/23-14:13:37.915437
      SID:2841753
      Source Port:6445
      Destination Port:49727
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497292841753 02/06/23-14:13:42.158315
      SID:2841753
      Source Port:6445
      Destination Port:49729
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497022841753 02/06/23-14:12:20.379177
      SID:2841753
      Source Port:6445
      Destination Port:49702
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497262841753 02/06/23-14:13:33.469565
      SID:2841753
      Source Port:6445
      Destination Port:49726
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374973364452816766 02/06/23-14:13:57.290193
      SID:2816766
      Source Port:49733
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497012841753 02/06/23-14:12:15.717836
      SID:2841753
      Source Port:6445
      Destination Port:49701
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374970764452816766 02/06/23-14:12:33.686837
      SID:2816766
      Source Port:49707
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497122841753 02/06/23-14:12:55.336364
      SID:2841753
      Source Port:6445
      Destination Port:49712
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497162841753 02/06/23-14:12:59.766454
      SID:2841753
      Source Port:6445
      Destination Port:49716
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497192841753 02/06/23-14:13:08.445515
      SID:2841753
      Source Port:6445
      Destination Port:49719
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374972364452816766 02/06/23-14:13:24.891407
      SID:2816766
      Source Port:49723
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497172841753 02/06/23-14:13:04.143032
      SID:2841753
      Source Port:6445
      Destination Port:49717
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497112841753 02/06/23-14:12:50.916490
      SID:2841753
      Source Port:6445
      Destination Port:49711
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374971764452816766 02/06/23-14:13:04.199805
      SID:2816766
      Source Port:49717
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374972764452816766 02/06/23-14:13:37.920388
      SID:2816766
      Source Port:49727
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374973064452816766 02/06/23-14:13:48.218570
      SID:2816766
      Source Port:49730
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374972264452816718 02/06/23-14:13:18.233724
      SID:2816718
      Source Port:49722
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374973464452816766 02/06/23-14:14:04.014579
      SID:2816766
      Source Port:49734
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374971064452816766 02/06/23-14:12:46.639827
      SID:2816766
      Source Port:49710
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374972064452816766 02/06/23-14:13:12.842490
      SID:2816766
      Source Port:49720
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374971164452816766 02/06/23-14:12:50.979729
      SID:2816766
      Source Port:49711
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374973164452816766 02/06/23-14:13:52.687469
      SID:2816766
      Source Port:49731
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374970164452816766 02/06/23-14:12:15.779461
      SID:2816766
      Source Port:49701
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374972564452816766 02/06/23-14:13:29.249183
      SID:2816766
      Source Port:49725
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.132.106.37192.168.2.56445497092810290 02/06/23-14:12:38.309927
      SID:2810290
      Source Port:6445
      Destination Port:49709
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374971964452816766 02/06/23-14:13:08.627802
      SID:2816766
      Source Port:49719
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.545.132.106.374970364452816718 02/06/23-14:12:27.309652
      SID:2816718
      Source Port:49703
      Destination Port:6445
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: lb64Iy4W4e.exeReversingLabs: Detection: 41%
      Source: lb64Iy4W4e.exeVirustotal: Detection: 34%Perma Link
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeReversingLabs: Detection: 23%
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeVirustotal: Detection: 29%Perma Link
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeReversingLabs: Detection: 23%
      Source: Yara matchFile source: 1.2.tohjyweui.exe.643658.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.tohjyweui.exe.630000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.tohjyweui.exe.643658.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.tohjyweui.exe.630000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: tohjyweui.exe PID: 5884, type: MEMORYSTR
      Source: 1.2.tohjyweui.exe.643658.1.raw.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "d046c01c-51f5-4c8c-b5b9-b566d533", "Group": "", "Domain1": "alertt.duckdns.org", "Domain2": "alertt.duckdns.org", "Port": 6445, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Source: lb64Iy4W4e.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: lb64Iy4W4e.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: wntdll.pdbUGP source: tohjyweui.exe, 00000001.00000003.314559627.000000001A6B0000.00000004.00001000.00020000.00000000.sdmp, tohjyweui.exe, 00000001.00000003.311976529.000000001A840000.00000004.00001000.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: tohjyweui.exe, 00000001.00000003.314559627.000000001A6B0000.00000004.00001000.00020000.00000000.sdmp, tohjyweui.exe, 00000001.00000003.311976529.000000001A840000.00000004.00001000.00020000.00000000.sdmp
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeCode function: 0_2_0040290B FindFirstFileW,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009C42E3 FindFirstFileExW,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009C46CD FindFirstFileExW,FindNextFileW,FindClose,FindClose,

      Networking

      barindex
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49701
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49701 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49702 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49702
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49703 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.5:49703 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49707
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49707 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49709 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 45.132.106.37:6445 -> 192.168.2.5:49709
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49710 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49711
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49711 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2823337 ETPRO TROJAN Nanocore Checkin Pattern 192.168.2.5:49711 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49712
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49712 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49716
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49716 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49717
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49717 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49719
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49719 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49720
      Source: TrafficSnort IDS: 2810451 ETPRO TROJAN NanoCore RAT Keepalive Response 3 45.132.106.37:6445 -> 192.168.2.5:49720
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49720 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49722 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.5:49722 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49723 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49725
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49725 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49726
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49726 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49727
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49727 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49729
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49729 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49730 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49731
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49731 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49733
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49733 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49734 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49735
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49735 -> 45.132.106.37:6445
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.132.106.37:6445 -> 192.168.2.5:49736
      Source: Malware configuration extractorURLs: alertt.duckdns.org
      Source: unknownDNS query: name: alertt.duckdns.org
      Source: Joe Sandbox ViewASN Name: ON-LINE-DATAServerlocation-NetherlandsDrontenNL ON-LINE-DATAServerlocation-NetherlandsDrontenNL
      Source: global trafficTCP traffic: 192.168.2.5:49701 -> 45.132.106.37:6445
      Source: lb64Iy4W4e.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: unknownDNS traffic detected: queries for: alertt.duckdns.org
      Source: tohjyweui.exe, 00000001.00000002.320375242.00000000006BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeCode function: 0_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 1.2.tohjyweui.exe.643658.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.tohjyweui.exe.630000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.tohjyweui.exe.643658.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.tohjyweui.exe.630000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: tohjyweui.exe PID: 5884, type: MEMORYSTR

      System Summary

      barindex
      Source: 1.2.tohjyweui.exe.643658.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 1.2.tohjyweui.exe.643658.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 1.2.tohjyweui.exe.643658.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 1.2.tohjyweui.exe.643658.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 1.2.tohjyweui.exe.630000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 1.2.tohjyweui.exe.630000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 1.2.tohjyweui.exe.630000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 1.2.tohjyweui.exe.630000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 1.2.tohjyweui.exe.643658.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 1.2.tohjyweui.exe.643658.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 1.2.tohjyweui.exe.643658.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 1.2.tohjyweui.exe.643658.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 1.2.tohjyweui.exe.630000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 1.2.tohjyweui.exe.630000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 1.2.tohjyweui.exe.630000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 1.2.tohjyweui.exe.630000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: tohjyweui.exe PID: 5884, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: Process Memory Space: tohjyweui.exe PID: 5884, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: tohjyweui.exe PID: 5884, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: lb64Iy4W4e.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: 1.2.tohjyweui.exe.643658.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.tohjyweui.exe.643658.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.tohjyweui.exe.643658.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 1.2.tohjyweui.exe.643658.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 1.2.tohjyweui.exe.643658.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 1.2.tohjyweui.exe.630000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.tohjyweui.exe.630000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.tohjyweui.exe.630000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 1.2.tohjyweui.exe.630000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 1.2.tohjyweui.exe.630000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 1.2.tohjyweui.exe.643658.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.tohjyweui.exe.643658.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.tohjyweui.exe.643658.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 1.2.tohjyweui.exe.643658.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 1.2.tohjyweui.exe.643658.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 1.2.tohjyweui.exe.630000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.tohjyweui.exe.630000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.tohjyweui.exe.630000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 1.2.tohjyweui.exe.630000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 1.2.tohjyweui.exe.630000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: tohjyweui.exe PID: 5884, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: tohjyweui.exe PID: 5884, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: tohjyweui.exe PID: 5884, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5716 -s 632
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeCode function: 0_2_00406D5F
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009D00A7
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009F78A4
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009CE8A2
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009CF9B4
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009B59D3
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009E11E1
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009CF289
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009D0BA1
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009CEBEA
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009D041B
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009CFD42
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009CF617
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009D0780
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009D0FD1
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009EFF1F
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009EEF20
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009CEF41
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_00600F9C
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_00601247
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009B00A7
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009B041B
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009B0780
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009AE8A2
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009DAA75
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009B0BA1
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009AEBEA
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009B0FD1
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009CEF20
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009C8F5E
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009AEF41
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009DAF71
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009C11E1
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009AF289
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009DB389
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009CF430
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009AF617
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009DB7BE
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009D78A4
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009CF870
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009AF9B4
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009959D3
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009DBBF3
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009CDB32
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009AFD42
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009CFF1F
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: String function: 009B33C0 appears 32 times
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: String function: 009BE6D6 appears 54 times
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: String function: 009C6B49 appears 33 times
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: String function: 009933C0 appears 69 times
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009B1150 OpenSCManagerW,OpenServiceW,DeleteService,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,CloseServiceHandle,
      Source: lb64Iy4W4e.exeReversingLabs: Detection: 41%
      Source: lb64Iy4W4e.exeVirustotal: Detection: 34%
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeFile read: C:\Users\user\Desktop\lb64Iy4W4e.exeJump to behavior
      Source: lb64Iy4W4e.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Users\user\Desktop\lb64Iy4W4e.exe C:\Users\user\Desktop\lb64Iy4W4e.exe
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeProcess created: C:\Users\user\AppData\Local\Temp\tohjyweui.exe "C:\Users\user\AppData\Local\Temp\tohjyweui.exe" C:\Users\user\AppData\Local\Temp\fwbfw.c
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess created: C:\Users\user\AppData\Local\Temp\tohjyweui.exe C:\Users\user\AppData\Local\Temp\tohjyweui.exe
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exe "C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exe" "C:\Users\user\AppData\Local\Temp\tohjyweui.exe" C:\Users\user\A
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5716 -s 632
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exe "C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exe" "C:\Users\user\AppData\Local\Temp\tohjyweui.exe" C:\Users\user\A
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5408 -s 604
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeProcess created: C:\Users\user\AppData\Local\Temp\tohjyweui.exe "C:\Users\user\AppData\Local\Temp\tohjyweui.exe" C:\Users\user\AppData\Local\Temp\fwbfw.c
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess created: C:\Users\user\AppData\Local\Temp\tohjyweui.exe C:\Users\user\AppData\Local\Temp\tohjyweui.exe
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeFile created: C:\Users\user\AppData\Roaming\swschqavfbkJump to behavior
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeFile created: C:\Users\user\AppData\Local\Temp\nsj2A95.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@9/17@24/1
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeCode function: 0_2_004021AA CoCreateInstance,
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: OpenSCManagerW,GetSystemDirectoryW,lstrcpyW,CreateServiceW,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: OpenSCManagerW,GetSystemDirectoryW,lstrcpyW,CreateServiceW,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeCode function: 0_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5716
      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5408
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{d046c01c-51f5-4c8c-b5b9-b566d533dece}
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: GetTickCount
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: Kernel32.dll
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: Sleep
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: Kernel32.dll
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: VirtualAlloc
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: Kernel32.dll
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: Embedding
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: regserver
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: unregserver
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: unregister
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: unreg
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: package
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: ACTION=ADMIN
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: uninstall
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: update
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: uiet
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: passive
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: help
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: REMOVE=ALL
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: REMOVE=ALL
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: @uv
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: GetTickCount
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: Kernel32.dll
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: Sleep
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: Kernel32.dll
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: VirtualAlloc
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: Kernel32.dll
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: Embedding
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: regserver
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: unregserver
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: unregister
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: unreg
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: package
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: ACTION=ADMIN
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: uninstall
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: update
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: uiet
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: passive
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: help
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: REMOVE=ALL
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: REMOVE=ALL
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCommand line argument: @uv
      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: lb64Iy4W4e.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: wntdll.pdbUGP source: tohjyweui.exe, 00000001.00000003.314559627.000000001A6B0000.00000004.00001000.00020000.00000000.sdmp, tohjyweui.exe, 00000001.00000003.311976529.000000001A840000.00000004.00001000.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: tohjyweui.exe, 00000001.00000003.314559627.000000001A6B0000.00000004.00001000.00020000.00000000.sdmp, tohjyweui.exe, 00000001.00000003.311976529.000000001A840000.00000004.00001000.00020000.00000000.sdmp
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009B3406 push ecx; ret
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009F8EBD push ecx; ret
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009D8EBD push ecx; ret
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_00993406 push ecx; ret
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009B1C00 LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,Sleep,VirtualAlloc,__fread_nolock,#17,GetCommandLineW,lstrlenW,lstrlenW,lstrlenW,#169,ExitProcess,lstrlenW,lstrlenW,#141,lstrlenW,CLSIDFromString,#190,#88,#88,#6,#175,FreeLibrary,
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeFile created: C:\Users\user\AppData\Local\Temp\tohjyweui.exeJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeFile created: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run luqajfoxtJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run luqajfoxtJump to behavior

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeFile opened: C:\Users\user\AppData\Local\Temp\tohjyweui.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcess
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exe TID: 5536Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exe TID: 5496Thread sleep time: -40000s >= -30000s
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exe TID: 5512Thread sleep time: -840000s >= -30000s
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeLast function: Thread delayed
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWindow / User API: threadDelayed 403
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWindow / User API: foregroundWindowGot 835
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWindow / User API: foregroundWindowGot 778
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeAPI coverage: 4.9 %
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_00600EBF GetSystemInfo,
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeCode function: 0_2_0040290B FindFirstFileW,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009C42E3 FindFirstFileExW,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009C46CD FindFirstFileExW,FindNextFileW,FindClose,FindClose,
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009B3171 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009B1C00 LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,Sleep,VirtualAlloc,__fread_nolock,#17,GetCommandLineW,lstrlenW,lstrlenW,lstrlenW,#169,ExitProcess,lstrlenW,lstrlenW,#141,lstrlenW,CLSIDFromString,#190,#88,#88,#6,#175,FreeLibrary,
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009B18C0 MultiByteToWideChar,lstrlenW,GetProcessHeap,HeapAlloc,MultiByteToWideChar,GetThreadLocale,CompareStringW,GetProcessHeap,HeapFree,
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess token adjusted: Debug
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009D9BCC mov ecx, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009E6DA6 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_0060005F mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_0060017B mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_0060013E mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_00600109 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009C6BBA mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009C6BFD mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009C6B77 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009C6C58 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009C6DA6 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009C6DD7 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009C6D1E mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009C6D62 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009B9BCC mov ecx, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeMemory allocated: page read and write | page guard
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009B3171 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009B35EF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009DCE64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_00993306 SetUnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009BCE64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_00993171 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: 3_2_009935EF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeSection loaded: unknown target: C:\Users\user\AppData\Local\Temp\tohjyweui.exe protection: execute and read and write
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeProcess created: C:\Users\user\AppData\Local\Temp\tohjyweui.exe C:\Users\user\AppData\Local\Temp\tohjyweui.exe
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: EnumSystemLocalesW,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: EnumSystemLocalesW,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: EnumSystemLocalesW,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: GetLocaleInfoW,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: EnumSystemLocalesW,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: EnumSystemLocalesW,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: EnumSystemLocalesW,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: GetLocaleInfoW,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: GetLocaleInfoW,
      Source: C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009B341B cpuid
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeCode function: 1_2_009B3046 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
      Source: C:\Users\user\Desktop\lb64Iy4W4e.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\AppData\Local\Temp\tohjyweui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 1.2.tohjyweui.exe.643658.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.tohjyweui.exe.630000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.tohjyweui.exe.643658.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.tohjyweui.exe.630000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: tohjyweui.exe PID: 5884, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: tohjyweui.exe, 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Yara matchFile source: 1.2.tohjyweui.exe.643658.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.tohjyweui.exe.630000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.tohjyweui.exe.643658.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.tohjyweui.exe.630000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: tohjyweui.exe PID: 5884, type: MEMORYSTR
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Windows Management Instrumentation
      11
      Windows Service
      1
      Access Token Manipulation
      1
      Disable or Modify Tools
      1
      Input Capture
      1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
      System Shutdown/Reboot
      Default Accounts11
      Native API
      1
      Registry Run Keys / Startup Folder
      11
      Windows Service
      1
      Deobfuscate/Decode Files or Information
      LSASS Memory2
      File and Directory Discovery
      Remote Desktop Protocol1
      Input Capture
      Exfiltration Over Bluetooth1
      Non-Standard Port
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain Accounts2
      Command and Scripting Interpreter
      Logon Script (Windows)111
      Process Injection
      2
      Obfuscated Files or Information
      Security Account Manager26
      System Information Discovery
      SMB/Windows Admin Shares1
      Clipboard Data
      Automated Exfiltration1
      Remote Access Software
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local Accounts1
      Service Execution
      Logon Script (Mac)1
      Registry Run Keys / Startup Folder
      1
      Masquerading
      NTDS13
      Security Software Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer1
      Non-Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script21
      Virtualization/Sandbox Evasion
      LSA Secrets1
      Process Discovery
      SSHKeyloggingData Transfer Size Limits21
      Application Layer Protocol
      Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common1
      Access Token Manipulation
      Cached Domain Credentials21
      Virtualization/Sandbox Evasion
      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items111
      Process Injection
      DCSync1
      Application Window Discovery
      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
      Hidden Files and Directories
      Proc Filesystem1
      Remote System Discovery
      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 799403 Sample: lb64Iy4W4e.exe Startdate: 06/02/2023 Architecture: WINDOWS Score: 100 35 alertt.duckdns.org 2->35 45 Snort IDS alert for network traffic 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 Multi AV Scanner detection for submitted file 2->49 51 5 other signatures 2->51 8 lb64Iy4W4e.exe 19 2->8         started        11 tpyienirbwgp.exe 2->11         started        14 tpyienirbwgp.exe 2->14         started        signatures3 process4 file5 31 C:\Users\user\AppData\Local\...\tohjyweui.exe, PE32 8->31 dropped 16 tohjyweui.exe 1 2 8->16         started        55 Multi AV Scanner detection for dropped file 11->55 20 WerFault.exe 3 10 11->20         started        22 WerFault.exe 10 14->22         started        signatures6 process7 file8 29 C:\Users\user\AppData\...\tpyienirbwgp.exe, PE32 16->29 dropped 39 Multi AV Scanner detection for dropped file 16->39 41 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 16->41 43 Maps a DLL or memory area into another process 16->43 24 tohjyweui.exe 11 16->24         started        signatures9 process10 dnsIp11 37 alertt.duckdns.org 45.132.106.37, 49701, 49702, 49703 ON-LINE-DATAServerlocation-NetherlandsDrontenNL Ukraine 24->37 33 C:\Users\user\AppData\Roaming\...\run.dat, data 24->33 dropped 53 Hides that the sample has been downloaded from the Internet (zone.identifier) 24->53 file12 signatures13

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      lb64Iy4W4e.exe41%ReversingLabsWin32.Trojan.Nemesis
      lb64Iy4W4e.exe35%VirustotalBrowse
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\tohjyweui.exe23%ReversingLabsWin32.Trojan.Pwsx
      C:\Users\user\AppData\Local\Temp\tohjyweui.exe29%VirustotalBrowse
      C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exe23%ReversingLabsWin32.Trojan.Pwsx
      No Antivirus matches
      SourceDetectionScannerLabelLink
      alertt.duckdns.org1%VirustotalBrowse
      SourceDetectionScannerLabelLink
      alertt.duckdns.org0%Avira URL Cloudsafe
      alertt.duckdns.org1%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      alertt.duckdns.org
      45.132.106.37
      truetrueunknown
      NameMaliciousAntivirus DetectionReputation
      alertt.duckdns.orgtrue
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://nsis.sf.net/NSIS_ErrorErrorlb64Iy4W4e.exefalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        45.132.106.37
        alertt.duckdns.orgUkraine
        204601ON-LINE-DATAServerlocation-NetherlandsDrontenNLtrue
        Joe Sandbox Version:36.0.0 Rainbow Opal
        Analysis ID:799403
        Start date and time:2023-02-06 14:11:08 +01:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 10m 17s
        Hypervisor based Inspection enabled:false
        Report type:light
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:13
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample file name:lb64Iy4W4e.exe
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@9/17@24/1
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:
        • Successful, ratio: 99.2% (good quality ratio 96.5%)
        • Quality average: 87.9%
        • Quality standard deviation: 23.3%
        HCA Information:
        • Successful, ratio: 90%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, conhost.exe, svchost.exe
        • TCP Packets have been reduced to 100
        • Excluded IPs from analysis (whitelisted): 52.168.117.173, 104.208.16.94
        • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, client.wns.windows.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, watson.telemetry.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
        • Not all processes where analyzed, report is missing behavior information
        • Report creation exceeded maximum time and may have missing disassembly code information.
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        • Report size getting too big, too many NtDeviceIoControlFile calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        14:12:13AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run luqajfoxt C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exe "C:\Users\user\AppData\Local\Temp\tohjyweui.exe" C:\Users\user\A
        14:12:14API Interceptor941x Sleep call for process: tohjyweui.exe modified
        14:12:21AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run luqajfoxt C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exe "C:\Users\user\AppData\Local\Temp\tohjyweui.exe" C:\Users\user\A
        14:12:30API Interceptor2x Sleep call for process: WerFault.exe modified
        No context
        No context
        No context
        No context
        No context
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.929195913406343
        Encrypted:false
        SSDEEP:96:P5F7FbJUSjhRB70sSYpXIQcQmc6ycE8cw3yo++HbHgH3qTP+aVDPMbspoxGfnFhy:hJFbaoHY2GWoPjAQ+t/u7sFS274ItS
        MD5:96F6FB1E217DD003DCE5D7238773460B
        SHA1:89EAE1F997D7756D0AAEC192DE81E69178E6A4AF
        SHA-256:8C67EC275CAAFC86880994975244BCC733DD7348C732D69653E4F0C6E21279DC
        SHA-512:8CE3A7D0FE251B4B304FE130FEDEB9FC8C6D9580F0074C765968A5165D4030B0DE8D52B8A394FFCCC1760162AA4114F07E7CEA6DD3E6FB83F43D0C68BF465B9A
        Malicious:false
        Reputation:low
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.2.0.1.9.5.1.5.1.3.1.3.7.4.4.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.2.0.1.9.5.1.5.2.3.1.3.7.4.6.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.b.c.f.c.8.1.3.-.1.b.6.1.-.4.3.f.7.-.9.a.d.6.-.c.0.e.b.a.3.6.2.8.a.6.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.d.6.a.5.e.9.2.-.5.1.2.b.-.4.9.9.0.-.b.8.7.f.-.4.1.1.f.6.d.f.8.7.b.3.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.t.p.y.i.e.n.i.r.b.w.g.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.2.0.-.0.0.0.1.-.0.0.1.9.-.c.b.f.6.-.8.d.1.a.7.8.3.a.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.5.9.9.9.7.9.3.0.a.d.5.0.c.9.7.0.a.4.8.1.9.d.0.0.b.5.f.6.d.3.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.4.6.3.c.4.5.e.1.a.d.c.2.2.6.9.4.5.6.e.1.8.b.6.b.d.4.7.e.5.2.1.5.0.1.d.1.f.5.9.3.!.t.p.y.i.e.n.i.r.b.w.g.p...e.x.e.....T.a.r.g.e.t.A.p.p.V.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.9362570845292987
        Encrypted:false
        SSDEEP:192:VJNOFbaUHY2GWoPjtLIa/u7sFS274ItS:JOBacY2GFPjL/u7sFX4ItS
        MD5:2CBF5D2E716A4E2B5C6D278FE380657F
        SHA1:384DF552BA7C4BCB6AF9CEA2CA8D41C9F7A35C75
        SHA-256:296B9F299B3257C40397466A884CD0192583A8E96E768E42B1159C02C36CB1ED
        SHA-512:9A18CAA5753D47D557BABC07D0FF4D73590B22EF179AD8CBF90D309901F3D794F4A7D615EDE8F1B04A258752B4A486EAF9A7803B36E8A6FCD3AB7F734D181DC6
        Malicious:false
        Reputation:low
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.2.0.1.9.5.1.4.7.3.1.1.0.2.2.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.2.0.1.9.5.1.4.8.4.5.1.6.6.6.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.a.b.6.0.4.e.0.-.f.e.9.9.-.4.0.7.8.-.8.3.b.1.-.7.3.8.6.7.4.3.8.2.9.2.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.2.5.4.e.f.8.5.-.0.c.8.0.-.4.6.2.2.-.b.e.4.8.-.a.4.a.0.9.4.c.1.a.f.d.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.t.p.y.i.e.n.i.r.b.w.g.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.5.4.-.0.0.0.1.-.0.0.1.9.-.1.6.b.6.-.9.9.1.5.7.8.3.a.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.5.9.9.9.7.9.3.0.a.d.5.0.c.9.7.0.a.4.8.1.9.d.0.0.b.5.f.6.d.3.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.4.6.3.c.4.5.e.1.a.d.c.2.2.6.9.4.5.6.e.1.8.b.6.b.d.4.7.e.5.2.1.5.0.1.d.1.f.5.9.3.!.t.p.y.i.e.n.i.r.b.w.g.p...e.x.e.....T.a.r.g.e.t.A.p.p.V.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Mini DuMP crash report, 14 streams, Mon Feb 6 22:12:27 2023, 0x1205a4 type
        Category:dropped
        Size (bytes):40600
        Entropy (8bit):1.9089113720969164
        Encrypted:false
        SSDEEP:96:5q8GF8v/U/Ah+YSWsVnQH5mFC8cTi72icnus9ikoOuFJwQcv/DhP8st2S+OzbBPI:HLuAcPWsVQszCO2iQJNPzBPbrmsBmw7W
        MD5:524916739B17C605C2740855D1E7EC09
        SHA1:82283EE20177E916CDDCDA1AB1D044DEE085ED18
        SHA-256:53AB2B99083581BDC2B0F0A67B2E1458CE34B129E0FA4EF5D5604E956F2295C9
        SHA-512:AFF9E00E7827410D569BAE50D45E1A82EBCA1C67E53E89208BFC1181245985EB5F9C6C63C248EFE7BB00D89A3AFD7738F806FB1FBA27CE09C52ACEC8AC8AA211
        Malicious:false
        Reputation:low
        Preview:MDMP....... .......K{.c........................................\-..........T.......8...........T............................................................................................................U...........B...... .......GenuineIntelW...........T.......T...E{.c............................. ..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8368
        Entropy (8bit):3.690412367634023
        Encrypted:false
        SSDEEP:192:Rrl7r3GLNiy46O6YBSDSUfgmfjSzo2CpDo89bDYsfohm:RrlsNit6O6YB2SUfgmfjSszDLfT
        MD5:69B0AF479D657FA1AAB1F5B1D5D8A6B3
        SHA1:F64ED0D7D6779D2A6836CC4A3978825DC198D0A7
        SHA-256:ADB3A01ABACCDEBF58B337E58D3A4037125DD6783878C2118AF5FFC690EA2BE8
        SHA-512:6282615E7949977026F11FA8BDB42E396D20ACAC5DFFA8F4ED917027F4B4C1D5F1FDF47AEB97720BEB77985D8DFF70EA797E0902FDED85483EAB889B0016F169
        Malicious:false
        Reputation:low
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.7.1.6.<./.P.i.d.>.......
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4678
        Entropy (8bit):4.428640371795023
        Encrypted:false
        SSDEEP:48:cvIwSD8zsCJgtWI9ZlWgc8sqYj68fm8M4JatkFg+q8vJtp/xl9d:uITfQSUgrsqYDJyVKPp/xl9d
        MD5:0443A3F9E4C64F2076E63D871398340F
        SHA1:DF2AA90A48BD110ECA2562CF67A1F259FD2053D3
        SHA-256:C8550EC9C0DD614286C9284299C53AC51A7C0AA5D53092D213A36D7170BA88AB
        SHA-512:56152EB1ACA2F4D37C1532AF2818517619B23502DC8CE13669A699CA7B089433E48E5D1C15197EE39D34DD638152707EC254A15B5C87AAC45D72329204C6D112
        Malicious:false
        Reputation:low
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1901243" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Mini DuMP crash report, 14 streams, Mon Feb 6 22:12:31 2023, 0x1205a4 type
        Category:dropped
        Size (bytes):44156
        Entropy (8bit):1.878369031530301
        Encrypted:false
        SSDEEP:192:r5dlzYMjVOKpaOhRdc3Eb90iOif7hUOO+HGo:DlWKp9Rdc0bmKf/Go
        MD5:74158FB4A4C5D428524DFA57C800160F
        SHA1:91FD89B3502EBE8AA35D27A485D9E0AF8D2FB845
        SHA-256:68269F2E6CF5C585DA44D8A6E5E817305A803C12566634C500E22FD3A4BF1445
        SHA-512:EE80D93998D256257F44D1A93F78F92D62C62C9CEA65CBB5472809E2BDBB1B2E954128674F73147CF1B76480068337AFE9A799EDC2BA906C9EE6F5AF410B75B8
        Malicious:false
        Preview:MDMP....... .......O{.c........................................./..........T.......8...........T...........................`...........L....................................................................U...........B..............GenuineIntelW...........T....... ...N{.c............................. ..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8362
        Entropy (8bit):3.6903200268418375
        Encrypted:false
        SSDEEP:192:Rrl7r3GLNi2o6n6YBSUSUDgmfjSzo2CpDH89bUisfjv8m:RrlsNip6n6YBBSUDgmfjSsuUhf1
        MD5:E99E5C0BB9E7AD97E9C5EA642B80D6D9
        SHA1:E651F6215134C7A52E51C7707ADEA8F66825ABFF
        SHA-256:A165CD0C9C52EDD8B366FFE6E55E476A33C5E74327197C8B773CBBD966428206
        SHA-512:069B867E69BAFF255261CE33AF1A4A6452212EBF022D117799C7EA4ADF60C14BCEEFB9FC0CD7FFFBF7014E69E2227783E76E3553F8A88CD4E55271AA45840763
        Malicious:false
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.4.0.8.<./.P.i.d.>.......
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4678
        Entropy (8bit):4.430634465003027
        Encrypted:false
        SSDEEP:48:cvIwSD8zsCJgtWI9ZlWgc8sqYj88fm8M4JatkFg+q8vJt3/xl1d:uITfQSUgrsqYNJyZKP3/xl1d
        MD5:B02A5A7D16E8340BF24765A193DDDC9E
        SHA1:3A95D434E11165CFBF295BF5913A1F3AD6909C35
        SHA-256:C70ABF707A46B301967A1C419BF7D35D0334B68DC007A2D7CC10E710EABF22AA
        SHA-512:F12581E96D7AD20C3C5583A3D7FEDCD1A0C691A128055F96385F910A994BCB7005B80486D7B2E433357F91B081AA587811E50FFA4EB90690FF5559354B318FFD
        Malicious:false
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1901243" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
        Process:C:\Users\user\Desktop\lb64Iy4W4e.exe
        File Type:data
        Category:dropped
        Size (bytes):8143
        Entropy (8bit):7.188238050975561
        Encrypted:false
        SSDEEP:192:darcitQvArWiPvQcb9RuplmxcX/sCbFn/u/hhgv6LLtNI7ypzV:uCYrNPvQeAmaECbV+m69NI7q
        MD5:347856D905BEEA5827F7395DDD77048D
        SHA1:9D6D5347AE1CF53C2D187398FDB0CAB438F991C9
        SHA-256:66B1F21A3BE5DAFCCFEF6CFEA835A488608FC471E9AC0D559D84CC4858CE683F
        SHA-512:E9BC2FF8EAAA97F2DD39F76BF9C266DFE68CAB1CDA220237D87D020B2E90F8650EF1E66332E18135B8F809914048AA73B2BEC218B1379904E84E0D78C3D6549C
        Malicious:false
        Preview:.705m..f.F<...05o.:......?v>.3.3.<......M.knl.02a..c.E<...42c. ......4.D63.6.3.?.....E.gni.53P..805.p8.q?.2.8.u .a..beabo.H0..v..v.@3.`..i/7.p.6.t(2..g.}.u<..G-.0.3.h.f....w8L$.m.r.D;F...okc..m.;4.q.?.<@.4.0...m..u<f...@%.`4..D'd.O$..A5..=..<r..4M.knl.82a..Q..401ec.t4.M4...D;.D..d580..E9....E....3.u.mje.18e..`W..480.x<.p=.4.4.p-P..6.c.!....D%.|.eX.....+..t..0....e.a..`beP..580.p=.t>.8.5.p,XE..Md.....M9..e...@4......F1..u.|c.....Lq.}<...v<+480.}<;.&<.>..r.^.q8F0....q.^.q8F0...^..M...3uc.....}<F...kloe.=8e....aboZf`Z\V.v...`ZYaZCV.v.j^YV.}.lZAU.w.`Z\^.q.iY.T.}.m^.q.[WlT.}....i.W.y.R.}.^.y.W.q.......XW..Mc.....\7!.K.y.a..`.....Z...Jo.......\GB.Gg.u......X.B.Kg.v......Pp..Nd.w.....\...Ke.}.....Y...Ko.p......G8.u....0<..480fP.401Y7a^?X580..D;.g.....A4...Tgn.`...G.X0P0.80..3cg.a.p0..D.`...igen.a..@.b.e.kX.013^3gR7]804p.F8.a.c..q.ad.G<n.`..D2..qb.e...knj..o.00`...)ecXg`Z]^.q.iYXk^OV.}.lZPU.w.`ZE^.q.iY]T.}.mR.R.t.lT.}._\hR.t...R.}.^.y.W.y.R.u......ZR..Jo....\5$.O
        Process:C:\Users\user\Desktop\lb64Iy4W4e.exe
        File Type:data
        Category:dropped
        Size (bytes):698028
        Entropy (8bit):7.460862363180337
        Encrypted:false
        SSDEEP:12288:57EOGOwPPrn9SfU+7cCxbOXnKO9tWYI0D9bhoK1j/HD03n1zvPF:57AOwPTU8WbGTtWYI0D9bho2D031zvP
        MD5:EF267C2426AD12867472601EE299537D
        SHA1:A7311F5C90CD1F31F5410A810558FB6242DE5A01
        SHA-256:CBC0231A9AD35A20F279FD0E38093D3DFD0DD6FFE6C276FAD5AE945064E539CC
        SHA-512:CC031C7E2DB6D86B7D3AE6311745E228142C33CB1DBE2EB69593C780CC2484DFB2B669ACE9DBCB05E143A389647CD118450A4490971D24A1616AB9B1BB1EB393
        Malicious:false
        Preview:z-......,...................m............,......z-.............................................................................."...........................................................................................................................................................G...............g...j...............................................................................................................................2...........7...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\lb64Iy4W4e.exe
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):370176
        Entropy (8bit):6.615303914837989
        Encrypted:false
        SSDEEP:6144:MWYtu0D9bhoKSoj/QED03mc8+z1zQpb+g4ZeMF:MWYI0D9bhoK1j/HD03n1zvPF
        MD5:64517EEC55E1F3C392B63B73D833E5F9
        SHA1:463C45E1ADC2269456E18B6BD47E521501D1F593
        SHA-256:91E93FF76C34BEB61A02F782558C8FF319558B63E008580EB567DD927663E19C
        SHA-512:E14FAF62CAE49174D895C6552E40FA54038BF46B350C6799938129E60F487F226260A5E3C23996BAF466494D5713A01612454F8C2334E581730CE5C1AE4A56A0
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 23%
        • Antivirus: Virustotal, Detection: 29%, Browse
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......%..a..a..a.....k...........u.....r.....B.....s.....v..a........`...Y.`.....`..Richa..........PE..L......c............................V,............@.......................................@.................................@z..................................0$...h...............................h..@...............|............................text...+........................... ..`.rdata..............................@..@.data................r..............@....gfids...............|..............@..@.rsrc................~..............@..@.reloc..0$.......&..................@..B........................................................................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\lb64Iy4W4e.exe
        File Type:data
        Category:dropped
        Size (bytes):308051
        Entropy (8bit):7.986580869538692
        Encrypted:false
        SSDEEP:6144:blfN7EA/J3IlnuTtuZd5BCkrSa195056sU+OwHu7sdkwb/mXY:X7EOGOwPPrn9SfU+7cCxbOXY
        MD5:12A293C8002A21714974ED14512456C4
        SHA1:5CFDA98DDB30ED52F34740D33B8197B3447C71A5
        SHA-256:30158501D83CB7C1453D281A51B6F192695E03EE5C90E0642B3EA273FE10BAAA
        SHA-512:C29B0E3F084E170665196E0E2D1D137F5376D8ECAC8BB786BFCB314DCCA6E9B91D3BD408C0F2CD4B165E4184E7FA5CB057C823E3313B71766B07B21BA5DB2B3E
        Malicious:false
        Preview:.<.Rw.......7... .J...J!....R.F&.....I.J./..O./.kN... .#.;..>e.E./.F...`7.*..]p./.3D..Z6.....}...=.@w*I...g-....:..n.K...<...e.Y(R`*p.V....^.....dL....W.dXz. ..2+*.a.G..l....j...FJ.{.'..:............gWIr.M .nO.;.[..I..J......t..@E..P.h.......w..N.....|..J.J...^!..;..~I..p...I(../..O...kN... `#.L..>.../...hX..<...7.8....W..D#l.|G.v_p(lr[..V.[VW...s4.u....nSK...h.H.....~.....(;.Ws@.......~.)0z.......{7...ACG...T7.\....U.U5p.[9_Y..e...h...(.bPVw.x.}...r..7.s..&....z.0..M.(m..P.h...p...uw...*...|...z .J...^!....R.F&.5..v|..e.d.O]..kN... .#.L..>.P../a..zX.......g'#c..W1..D#;.|G_v_.~.)[.}V..VW...sm.u.Vop.sK....H..;..A...(;k.s!.'......)Iz.......{7...AC&...k7.\....U.U5p.[9_Y..e...h....7b/Vw.x.}...r....s/3.&....z.0..M.(m..P.h.......w..!....0.... .J...^!....R.F&.....I.J./..O./.kN... .#.L..>.P../a..zX..<.....8....W.#.D#..|G.v_.(l)[.}V..VW...s4.u....n.K...h.H.........(;k.s!.'.....~.)0z.......{7...AC&...k7.\....U.U5p.[9_Y..e...h....7b/Vw.x.}...r....s/3.&
        Process:C:\Users\user\AppData\Local\Temp\tohjyweui.exe
        File Type:data
        Category:dropped
        Size (bytes):232
        Entropy (8bit):7.024371743172393
        Encrypted:false
        SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
        MD5:32D0AAE13696FF7F8AF33B2D22451028
        SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
        SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
        SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
        Malicious:false
        Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
        Process:C:\Users\user\AppData\Local\Temp\tohjyweui.exe
        File Type:data
        Category:dropped
        Size (bytes):8
        Entropy (8bit):3.0
        Encrypted:false
        SSDEEP:3:s5tn:At
        MD5:51FACF24B75B12CFB8F7B2FB57DA4C58
        SHA1:348477F51F4AA4EF999B743333CE5FDECCF76FB2
        SHA-256:C3AC357375B798C399E6BEF38CD7C254246A6EAB64B0FFF5C163CE385607568C
        SHA-512:B3812D6378CBA61C5504166B2997026494AE6513EA0F56E7952E97BAC8AAA6639359F72B680097714ED5E0F4495B95913B32F6EE39E3F1B0E5D4785758E3CF7F
        Malicious:true
        Preview:...3...H
        Process:C:\Users\user\AppData\Local\Temp\tohjyweui.exe
        File Type:data
        Category:dropped
        Size (bytes):40
        Entropy (8bit):5.221928094887364
        Encrypted:false
        SSDEEP:3:9bzY6oRDMjmPl:RzWDMCd
        MD5:AE0F5E6CE7122AF264EC533C6B15A27B
        SHA1:1265A495C42EED76CC043D50C60C23297E76CCE1
        SHA-256:73B0B92179C61C26589B47E9732CE418B07EDEE3860EE5A2A5FB06F3B8AA9B26
        SHA-512:DD44C2D24D4E3A0F0B988AD3D04683B5CB128298043134649BBE33B2512CE0C9B1A8E7D893B9F66FBBCDD901E2B0646C4533FB6C0C8C4AFCB95A0EFB95D446F8
        Malicious:false
        Preview:9iH...}Z.4..f..... 8.j....|.&X..e.F.*.
        Process:C:\Users\user\AppData\Local\Temp\tohjyweui.exe
        File Type:data
        Category:dropped
        Size (bytes):426840
        Entropy (8bit):7.999608491116724
        Encrypted:true
        SSDEEP:12288:zKf137EiDsTjevgA4p0V7njXuWSvdVU7V4OC0Rr:+134i2lp67i5d8+OCg
        MD5:963D5E2C9C0008DFF05518B47C367A7F
        SHA1:C183D601FABBC9AC8FBFA0A0937DECC677535E74
        SHA-256:5EACF2974C9BB2C2E24CDC651C4840DD6F4B76A98F0E85E90279F1DBB2E6F3C0
        SHA-512:0C04E1C1A13070D48728D9F7F300D9B26DEC6EC8875D8D3017EAD52B9EE5BDF9B651A7F0FCC537761212831107646ED72B8ED017E7477E600BC0137EF857AE2C
        Malicious:false
        Preview:..g&jo...IPg...GM....R>i...o...I.>.&.r{....8...}...E....v.!7.u3e.. .....db...}.......".t(.xC9.cp.B....7...'.......%......w.^.._.......B.W%.<..i.0.{9.xS...5...)..w..$..C..?`F..u.5.T.X.w'Si..z.n{...Y!m...RA...xg....[7...z..9@.K.-...T..+.ACe....R....enO.....AoNMT.\^....}H&..4I...B.:..@..J...v..rI5..kP......2j....B..B.~.T..>.c..emW;Rn<9..[.r.o....R[....@=...:...L.g<.....I..%4[.G^.~.l'......v.p&.........+..S...9d/.{..H.`@.1..........f.\s...X.a.].<.h*...J4*...k.x....%3.......3.c..?%....>.!.}..)(.{...H...3..`'].Q.[sN..JX(.%pH....+......(...v.....H...3..8.a_..J..?4...y.N(..D.*h..g.jD..I...44Q?..N......oX.A......l...n?./..........$.!..;.^9"H........*...OkF....v.m_.e.v..f...."..bq{.....O.-....%R+...-..P.i..t5....2Z# ...#...,L..{..j..heT -=Z.P;...g.m)<owJ].J..../.p..8.u8.&..#.m9...j%..g&....g.x.I,....u.[....>./W...........*X...b*Z...ex.0..x.}.....Tb...[..H_M._.^N.d&...g._."@4N.pDs].GbT.......&p........Nw...%$=.....{..J.1....2....<E{..<!G..
        Process:C:\Users\user\AppData\Local\Temp\tohjyweui.exe
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):370176
        Entropy (8bit):6.615303914837989
        Encrypted:false
        SSDEEP:6144:MWYtu0D9bhoKSoj/QED03mc8+z1zQpb+g4ZeMF:MWYI0D9bhoK1j/HD03n1zvPF
        MD5:64517EEC55E1F3C392B63B73D833E5F9
        SHA1:463C45E1ADC2269456E18B6BD47E521501D1F593
        SHA-256:91E93FF76C34BEB61A02F782558C8FF319558B63E008580EB567DD927663E19C
        SHA-512:E14FAF62CAE49174D895C6552E40FA54038BF46B350C6799938129E60F487F226260A5E3C23996BAF466494D5713A01612454F8C2334E581730CE5C1AE4A56A0
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 23%
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......%..a..a..a.....k...........u.....r.....B.....s.....v..a........`...Y.`.....`..Richa..........PE..L......c............................V,............@.......................................@.................................@z..................................0$...h...............................h..@...............|............................text...+........................... ..`.rdata..............................@..@.data................r..............@....gfids...............|..............@..@.rsrc................~..............@..@.reloc..0$.......&..................@..B........................................................................................................................................................................................................................................................................
        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
        Entropy (8bit):7.396277761181723
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:lb64Iy4W4e.exe
        File size:663392
        MD5:4c7df43e37814754ad1c8a97ab971af8
        SHA1:c2315cba4dc175554869cf1c7d7b4ddfdb65adea
        SHA256:49cc6f25d16cf7c85d218bcd4ecbdedce0f5d4540bc5099436511291f48a3976
        SHA512:635c6f4c3d20a691cadae02d8f857d6aa37775b1d55302c59498e0ace80152413be2f0fd22b328db96ed41e381868f9c026f5176b430ba5e969dba8347f3d8a3
        SSDEEP:12288:3YueB8OT4Q9HIbbir1vIm4KQH/HxCl9KOlOMyhiZq+zeRZA7Y1g9R:3YPT4Q9HHr1vIRCLShqq+FL
        TLSH:74E402247A10C56FCA905BB84EA5E3B457B0EE5D3E549F0B63E03FBFBDB91915908220
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*.....
        Icon Hash:f2d29cccdcdcccdc
        Entrypoint:0x403640
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0x614F9B1F [Sat Sep 25 21:56:47 2021 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:61259b55b8912888e90f516ca08dc514
        Instruction
        push ebp
        mov ebp, esp
        sub esp, 000003F4h
        push ebx
        push esi
        push edi
        push 00000020h
        pop edi
        xor ebx, ebx
        push 00008001h
        mov dword ptr [ebp-14h], ebx
        mov dword ptr [ebp-04h], 0040A230h
        mov dword ptr [ebp-10h], ebx
        call dword ptr [004080C8h]
        mov esi, dword ptr [004080CCh]
        lea eax, dword ptr [ebp-00000140h]
        push eax
        mov dword ptr [ebp-0000012Ch], ebx
        mov dword ptr [ebp-2Ch], ebx
        mov dword ptr [ebp-28h], ebx
        mov dword ptr [ebp-00000140h], 0000011Ch
        call esi
        test eax, eax
        jne 00007FAD50A616FAh
        lea eax, dword ptr [ebp-00000140h]
        mov dword ptr [ebp-00000140h], 00000114h
        push eax
        call esi
        mov ax, word ptr [ebp-0000012Ch]
        mov ecx, dword ptr [ebp-00000112h]
        sub ax, 00000053h
        add ecx, FFFFFFD0h
        neg ax
        sbb eax, eax
        mov byte ptr [ebp-26h], 00000004h
        not eax
        and eax, ecx
        mov word ptr [ebp-2Ch], ax
        cmp dword ptr [ebp-0000013Ch], 0Ah
        jnc 00007FAD50A616CAh
        and word ptr [ebp-00000132h], 0000h
        mov eax, dword ptr [ebp-00000134h]
        movzx ecx, byte ptr [ebp-00000138h]
        mov dword ptr [0042A318h], eax
        xor eax, eax
        mov ah, byte ptr [ebp-0000013Ch]
        movzx eax, ax
        or eax, ecx
        xor ecx, ecx
        mov ch, byte ptr [ebp-2Ch]
        movzx ecx, cx
        shl eax, 10h
        or eax, ecx
        Programming Language:
        • [EXP] VC++ 6.0 SP5 build 8804
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b0000x32e60.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x66760x6800False0.6568134014423077data6.4174599871908855IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x80000x139a0x1400False0.4498046875data5.141066817170598IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0xa0000x203780x600False0.509765625data4.110582127654237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .ndata0x2b0000x100000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0x3b0000x32e600x33000False0.4702914368872549data5.337142337075559IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountry
        RT_ICON0x3b3580x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States
        RT_ICON0x4bb800xaac8PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
        RT_ICON0x566480x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States
        RT_ICON0x5faf00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States
        RT_ICON0x64f780x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States
        RT_ICON0x691a00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States
        RT_ICON0x6b7480x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States
        RT_ICON0x6c7f00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States
        RT_ICON0x6d1780x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States
        RT_DIALOG0x6d5e00x100dataEnglishUnited States
        RT_DIALOG0x6d6e00x11cdataEnglishUnited States
        RT_DIALOG0x6d8000x60dataEnglishUnited States
        RT_GROUP_ICON0x6d8600x84dataEnglishUnited States
        RT_VERSION0x6d8e80x234dataEnglishUnited States
        RT_MANIFEST0x6db200x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States
        DLLImport
        ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
        SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
        ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
        COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
        USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
        GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
        KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
        192.168.2.545.132.106.374971264452816766 02/06/23-14:12:55.395066TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497126445192.168.2.545.132.106.37
        45.132.106.37192.168.2.56445497312841753 02/06/23-14:13:52.517965TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454973145.132.106.37192.168.2.5
        192.168.2.545.132.106.374970964452816766 02/06/23-14:12:39.702248TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497096445192.168.2.545.132.106.37
        45.132.106.37192.168.2.56445497072841753 02/06/23-14:12:33.506820TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454970745.132.106.37192.168.2.5
        192.168.2.545.132.106.374973564452816766 02/06/23-14:14:08.694757TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497356445192.168.2.545.132.106.37
        45.132.106.37192.168.2.56445497202841753 02/06/23-14:13:12.771040TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454972045.132.106.37192.168.2.5
        192.168.2.545.132.106.374972964452816766 02/06/23-14:13:42.328059TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497296445192.168.2.545.132.106.37
        192.168.2.545.132.106.374970264452816766 02/06/23-14:12:20.468192TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497026445192.168.2.545.132.106.37
        45.132.106.37192.168.2.56445497252841753 02/06/23-14:13:29.137140TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454972545.132.106.37192.168.2.5
        192.168.2.545.132.106.374971164452823337 02/06/23-14:12:50.979729TCP2823337ETPRO TROJAN Nanocore Checkin Pattern497116445192.168.2.545.132.106.37
        45.132.106.37192.168.2.56445497202810451 02/06/23-14:13:12.771040TCP2810451ETPRO TROJAN NanoCore RAT Keepalive Response 364454972045.132.106.37192.168.2.5
        45.132.106.37192.168.2.56445497332841753 02/06/23-14:13:57.153095TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454973345.132.106.37192.168.2.5
        45.132.106.37192.168.2.56445497352841753 02/06/23-14:14:08.617792TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454973545.132.106.37192.168.2.5
        45.132.106.37192.168.2.56445497362841753 02/06/23-14:14:13.470154TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454973645.132.106.37192.168.2.5
        192.168.2.545.132.106.374972264452816766 02/06/23-14:13:18.836838TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497226445192.168.2.545.132.106.37
        192.168.2.545.132.106.374971664452816766 02/06/23-14:12:59.871071TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497166445192.168.2.545.132.106.37
        192.168.2.545.132.106.374970364452816766 02/06/23-14:12:29.256960TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497036445192.168.2.545.132.106.37
        192.168.2.545.132.106.374972664452816766 02/06/23-14:13:33.513858TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497266445192.168.2.545.132.106.37
        45.132.106.37192.168.2.56445497272841753 02/06/23-14:13:37.915437TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454972745.132.106.37192.168.2.5
        45.132.106.37192.168.2.56445497292841753 02/06/23-14:13:42.158315TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454972945.132.106.37192.168.2.5
        45.132.106.37192.168.2.56445497022841753 02/06/23-14:12:20.379177TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454970245.132.106.37192.168.2.5
        45.132.106.37192.168.2.56445497262841753 02/06/23-14:13:33.469565TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454972645.132.106.37192.168.2.5
        192.168.2.545.132.106.374973364452816766 02/06/23-14:13:57.290193TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497336445192.168.2.545.132.106.37
        45.132.106.37192.168.2.56445497012841753 02/06/23-14:12:15.717836TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454970145.132.106.37192.168.2.5
        192.168.2.545.132.106.374970764452816766 02/06/23-14:12:33.686837TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497076445192.168.2.545.132.106.37
        45.132.106.37192.168.2.56445497122841753 02/06/23-14:12:55.336364TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454971245.132.106.37192.168.2.5
        45.132.106.37192.168.2.56445497162841753 02/06/23-14:12:59.766454TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454971645.132.106.37192.168.2.5
        45.132.106.37192.168.2.56445497192841753 02/06/23-14:13:08.445515TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454971945.132.106.37192.168.2.5
        192.168.2.545.132.106.374972364452816766 02/06/23-14:13:24.891407TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497236445192.168.2.545.132.106.37
        45.132.106.37192.168.2.56445497172841753 02/06/23-14:13:04.143032TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454971745.132.106.37192.168.2.5
        45.132.106.37192.168.2.56445497112841753 02/06/23-14:12:50.916490TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)64454971145.132.106.37192.168.2.5
        192.168.2.545.132.106.374971764452816766 02/06/23-14:13:04.199805TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497176445192.168.2.545.132.106.37
        192.168.2.545.132.106.374972764452816766 02/06/23-14:13:37.920388TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497276445192.168.2.545.132.106.37
        192.168.2.545.132.106.374973064452816766 02/06/23-14:13:48.218570TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497306445192.168.2.545.132.106.37
        192.168.2.545.132.106.374972264452816718 02/06/23-14:13:18.233724TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497226445192.168.2.545.132.106.37
        192.168.2.545.132.106.374973464452816766 02/06/23-14:14:04.014579TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497346445192.168.2.545.132.106.37
        192.168.2.545.132.106.374971064452816766 02/06/23-14:12:46.639827TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497106445192.168.2.545.132.106.37
        192.168.2.545.132.106.374972064452816766 02/06/23-14:13:12.842490TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497206445192.168.2.545.132.106.37
        192.168.2.545.132.106.374971164452816766 02/06/23-14:12:50.979729TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497116445192.168.2.545.132.106.37
        192.168.2.545.132.106.374973164452816766 02/06/23-14:13:52.687469TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497316445192.168.2.545.132.106.37
        192.168.2.545.132.106.374970164452816766 02/06/23-14:12:15.779461TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497016445192.168.2.545.132.106.37
        192.168.2.545.132.106.374972564452816766 02/06/23-14:13:29.249183TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497256445192.168.2.545.132.106.37
        45.132.106.37192.168.2.56445497092810290 02/06/23-14:12:38.309927TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 164454970945.132.106.37192.168.2.5
        192.168.2.545.132.106.374971964452816766 02/06/23-14:13:08.627802TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497196445192.168.2.545.132.106.37
        192.168.2.545.132.106.374970364452816718 02/06/23-14:12:27.309652TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497036445192.168.2.545.132.106.37
        TimestampSource PortDest PortSource IPDest IP
        Feb 6, 2023 14:12:15.550626040 CET497016445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:15.580632925 CET64454970145.132.106.37192.168.2.5
        Feb 6, 2023 14:12:15.580776930 CET497016445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:15.631295919 CET497016445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:15.676197052 CET64454970145.132.106.37192.168.2.5
        Feb 6, 2023 14:12:15.687864065 CET497016445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:15.717835903 CET64454970145.132.106.37192.168.2.5
        Feb 6, 2023 14:12:15.718019962 CET497016445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:15.747594118 CET64454970145.132.106.37192.168.2.5
        Feb 6, 2023 14:12:15.779460907 CET497016445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:15.858882904 CET64454970145.132.106.37192.168.2.5
        Feb 6, 2023 14:12:15.863033056 CET497016445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:15.943516970 CET497016445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:15.952651978 CET64454970145.132.106.37192.168.2.5
        Feb 6, 2023 14:12:15.953249931 CET497016445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:20.210206985 CET497026445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:20.239721060 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.239864111 CET497026445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:20.258255005 CET497026445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:20.316607952 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.316914082 CET497026445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:20.349812031 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.349951982 CET497026445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:20.379177094 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.379296064 CET497026445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:20.468054056 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.468192101 CET497026445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:20.501760006 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.501795053 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.501815081 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.501837015 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.501878977 CET497026445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:20.501914978 CET497026445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:20.526129007 CET497026445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:20.530669928 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.530744076 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.530775070 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.530891895 CET497026445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:20.531017065 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.531049013 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.531078100 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.531106949 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.531137943 CET64454970245.132.106.37192.168.2.5
        Feb 6, 2023 14:12:20.531161070 CET497026445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:20.531184912 CET497026445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:26.676229000 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:26.714061975 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:26.714267015 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:26.753952026 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:26.827461004 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:26.827663898 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:26.921391964 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:26.921576023 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:26.950916052 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:26.962414026 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.046224117 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.046386003 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.076018095 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.076051950 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.076072931 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.076097965 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.076158047 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.076158047 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.086903095 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.105926991 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.106000900 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.106045961 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.106076956 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.106089115 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.106117964 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.106117964 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.106132984 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.106154919 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.106177092 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.106189013 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.106220961 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.106235981 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.106266022 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.106276989 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.106332064 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.135333061 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.135390043 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.135423899 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.135458946 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.135481119 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.135489941 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.135513067 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.135521889 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.135560989 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.135591030 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.135591984 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.135613918 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.135637045 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.135668039 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.135680914 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.135699034 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.135731936 CET64454970345.132.106.37192.168.2.5
        Feb 6, 2023 14:12:27.135735035 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.135747910 CET497036445192.168.2.545.132.106.37
        Feb 6, 2023 14:12:27.135765076 CET64454970345.132.106.37192.168.2.5
        TimestampSource PortDest PortSource IPDest IP
        Feb 6, 2023 14:12:15.426714897 CET6189353192.168.2.58.8.8.8
        Feb 6, 2023 14:12:15.533972979 CET53618938.8.8.8192.168.2.5
        Feb 6, 2023 14:12:20.100056887 CET6064953192.168.2.58.8.8.8
        Feb 6, 2023 14:12:20.208462000 CET53606498.8.8.8192.168.2.5
        Feb 6, 2023 14:12:24.860294104 CET5144153192.168.2.58.8.8.8
        Feb 6, 2023 14:12:24.969638109 CET53514418.8.8.8192.168.2.5
        Feb 6, 2023 14:12:33.325907946 CET6145253192.168.2.58.8.8.8
        Feb 6, 2023 14:12:33.434902906 CET53614528.8.8.8192.168.2.5
        Feb 6, 2023 14:12:37.797481060 CET6532353192.168.2.58.8.8.8
        Feb 6, 2023 14:12:37.817137957 CET53653238.8.8.8192.168.2.5
        Feb 6, 2023 14:12:43.868993998 CET5148453192.168.2.58.8.8.8
        Feb 6, 2023 14:12:43.889022112 CET53514848.8.8.8192.168.2.5
        Feb 6, 2023 14:12:50.823187113 CET6344653192.168.2.58.8.8.8
        Feb 6, 2023 14:12:50.841149092 CET53634468.8.8.8192.168.2.5
        Feb 6, 2023 14:12:55.152124882 CET5675153192.168.2.58.8.8.8
        Feb 6, 2023 14:12:55.259871006 CET53567518.8.8.8192.168.2.5
        Feb 6, 2023 14:12:59.525441885 CET5506853192.168.2.58.8.8.8
        Feb 6, 2023 14:12:59.635647058 CET53550688.8.8.8192.168.2.5
        Feb 6, 2023 14:13:04.046624899 CET5668253192.168.2.58.8.8.8
        Feb 6, 2023 14:13:04.065140009 CET53566828.8.8.8192.168.2.5
        Feb 6, 2023 14:13:08.351641893 CET6265953192.168.2.58.8.8.8
        Feb 6, 2023 14:13:08.369720936 CET53626598.8.8.8192.168.2.5
        Feb 6, 2023 14:13:12.673418999 CET5858153192.168.2.58.8.8.8
        Feb 6, 2023 14:13:12.691442966 CET53585818.8.8.8192.168.2.5
        Feb 6, 2023 14:13:17.034033060 CET6551353192.168.2.58.8.8.8
        Feb 6, 2023 14:13:17.052063942 CET53655138.8.8.8192.168.2.5
        Feb 6, 2023 14:13:22.955478907 CET5668753192.168.2.58.8.8.8
        Feb 6, 2023 14:13:23.066755056 CET53566878.8.8.8192.168.2.5
        Feb 6, 2023 14:13:29.044564962 CET5268853192.168.2.58.8.8.8
        Feb 6, 2023 14:13:29.064649105 CET53526888.8.8.8192.168.2.5
        Feb 6, 2023 14:13:33.371251106 CET6134453192.168.2.58.8.8.8
        Feb 6, 2023 14:13:33.389108896 CET53613448.8.8.8192.168.2.5
        Feb 6, 2023 14:13:37.719351053 CET5397253192.168.2.58.8.8.8
        Feb 6, 2023 14:13:37.826854944 CET53539728.8.8.8192.168.2.5
        Feb 6, 2023 14:13:42.069423914 CET5847253192.168.2.58.8.8.8
        Feb 6, 2023 14:13:42.087323904 CET53584728.8.8.8192.168.2.5
        Feb 6, 2023 14:13:46.482965946 CET6017753192.168.2.58.8.8.8
        Feb 6, 2023 14:13:46.501174927 CET53601778.8.8.8192.168.2.5
        Feb 6, 2023 14:13:52.392618895 CET6028453192.168.2.58.8.8.8
        Feb 6, 2023 14:13:52.412906885 CET53602848.8.8.8192.168.2.5
        Feb 6, 2023 14:13:56.955427885 CET5090253192.168.2.58.8.8.8
        Feb 6, 2023 14:13:57.066534042 CET53509028.8.8.8192.168.2.5
        Feb 6, 2023 14:14:01.363904953 CET5382353192.168.2.58.8.8.8
        Feb 6, 2023 14:14:01.702450037 CET53538238.8.8.8192.168.2.5
        Feb 6, 2023 14:14:08.415575981 CET4976953192.168.2.58.8.8.8
        Feb 6, 2023 14:14:08.523582935 CET53497698.8.8.8192.168.2.5
        Feb 6, 2023 14:14:13.383150101 CET4957953192.168.2.58.8.8.8
        Feb 6, 2023 14:14:13.401088953 CET53495798.8.8.8192.168.2.5
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Feb 6, 2023 14:12:15.426714897 CET192.168.2.58.8.8.80x65bcStandard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:12:20.100056887 CET192.168.2.58.8.8.80xff1Standard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:12:24.860294104 CET192.168.2.58.8.8.80x37d5Standard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:12:33.325907946 CET192.168.2.58.8.8.80x815Standard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:12:37.797481060 CET192.168.2.58.8.8.80xc389Standard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:12:43.868993998 CET192.168.2.58.8.8.80x1b3fStandard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:12:50.823187113 CET192.168.2.58.8.8.80xf6f0Standard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:12:55.152124882 CET192.168.2.58.8.8.80xc366Standard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:12:59.525441885 CET192.168.2.58.8.8.80x24a0Standard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:04.046624899 CET192.168.2.58.8.8.80x8593Standard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:08.351641893 CET192.168.2.58.8.8.80x44d3Standard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:12.673418999 CET192.168.2.58.8.8.80x4bc6Standard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:17.034033060 CET192.168.2.58.8.8.80x77f3Standard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:22.955478907 CET192.168.2.58.8.8.80xd47bStandard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:29.044564962 CET192.168.2.58.8.8.80x4e86Standard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:33.371251106 CET192.168.2.58.8.8.80xde45Standard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:37.719351053 CET192.168.2.58.8.8.80xadceStandard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:42.069423914 CET192.168.2.58.8.8.80xee19Standard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:46.482965946 CET192.168.2.58.8.8.80x1898Standard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:52.392618895 CET192.168.2.58.8.8.80x665cStandard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:56.955427885 CET192.168.2.58.8.8.80xc871Standard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:14:01.363904953 CET192.168.2.58.8.8.80x26aStandard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:14:08.415575981 CET192.168.2.58.8.8.80xd10cStandard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        Feb 6, 2023 14:14:13.383150101 CET192.168.2.58.8.8.80xa53fStandard query (0)alertt.duckdns.orgA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Feb 6, 2023 14:12:15.533972979 CET8.8.8.8192.168.2.50x65bcNo error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:12:20.208462000 CET8.8.8.8192.168.2.50xff1No error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:12:24.969638109 CET8.8.8.8192.168.2.50x37d5No error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:12:33.434902906 CET8.8.8.8192.168.2.50x815No error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:12:37.817137957 CET8.8.8.8192.168.2.50xc389No error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:12:43.889022112 CET8.8.8.8192.168.2.50x1b3fNo error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:12:50.841149092 CET8.8.8.8192.168.2.50xf6f0No error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:12:55.259871006 CET8.8.8.8192.168.2.50xc366No error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:12:59.635647058 CET8.8.8.8192.168.2.50x24a0No error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:04.065140009 CET8.8.8.8192.168.2.50x8593No error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:08.369720936 CET8.8.8.8192.168.2.50x44d3No error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:12.691442966 CET8.8.8.8192.168.2.50x4bc6No error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:17.052063942 CET8.8.8.8192.168.2.50x77f3No error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:23.066755056 CET8.8.8.8192.168.2.50xd47bNo error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:29.064649105 CET8.8.8.8192.168.2.50x4e86No error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:33.389108896 CET8.8.8.8192.168.2.50xde45No error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:37.826854944 CET8.8.8.8192.168.2.50xadceNo error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:42.087323904 CET8.8.8.8192.168.2.50xee19No error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:46.501174927 CET8.8.8.8192.168.2.50x1898No error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:52.412906885 CET8.8.8.8192.168.2.50x665cNo error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:13:57.066534042 CET8.8.8.8192.168.2.50xc871No error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:14:01.702450037 CET8.8.8.8192.168.2.50x26aNo error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:14:08.523582935 CET8.8.8.8192.168.2.50xd10cNo error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false
        Feb 6, 2023 14:14:13.401088953 CET8.8.8.8192.168.2.50xa53fNo error (0)alertt.duckdns.org45.132.106.37A (IP address)IN (0x0001)false

        Click to jump to process

        Target ID:0
        Start time:14:12:08
        Start date:06/02/2023
        Path:C:\Users\user\Desktop\lb64Iy4W4e.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\Desktop\lb64Iy4W4e.exe
        Imagebase:0x400000
        File size:663392 bytes
        MD5 hash:4C7DF43E37814754AD1C8A97AB971AF8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low

        Target ID:1
        Start time:14:12:08
        Start date:06/02/2023
        Path:C:\Users\user\AppData\Local\Temp\tohjyweui.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\AppData\Local\Temp\tohjyweui.exe" C:\Users\user\AppData\Local\Temp\fwbfw.c
        Imagebase:0x9b0000
        File size:370176 bytes
        MD5 hash:64517EEC55E1F3C392B63B73D833E5F9
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
        • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.320288694.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
        Antivirus matches:
        • Detection: 23%, ReversingLabs
        • Detection: 29%, Virustotal, Browse
        Reputation:low

        Target ID:2
        Start time:14:12:10
        Start date:06/02/2023
        Path:C:\Users\user\AppData\Local\Temp\tohjyweui.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\AppData\Local\Temp\tohjyweui.exe
        Imagebase:0x9b0000
        File size:370176 bytes
        MD5 hash:64517EEC55E1F3C392B63B73D833E5F9
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:.Net C# or VB.NET
        Reputation:low

        Target ID:3
        Start time:14:12:21
        Start date:06/02/2023
        Path:C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exe" "C:\Users\user\AppData\Local\Temp\tohjyweui.exe" C:\Users\user\A
        Imagebase:0x990000
        File size:370176 bytes
        MD5 hash:64517EEC55E1F3C392B63B73D833E5F9
        Has elevated privileges:false
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Antivirus matches:
        • Detection: 23%, ReversingLabs
        Reputation:low

        Target ID:6
        Start time:14:12:26
        Start date:06/02/2023
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5716 -s 632
        Imagebase:0x890000
        File size:434592 bytes
        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
        Has elevated privileges:false
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Reputation:high

        Target ID:7
        Start time:14:12:30
        Start date:06/02/2023
        Path:C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\AppData\Roaming\swschqavfbk\tpyienirbwgp.exe" "C:\Users\user\AppData\Local\Temp\tohjyweui.exe" C:\Users\user\A
        Imagebase:0x990000
        File size:370176 bytes
        MD5 hash:64517EEC55E1F3C392B63B73D833E5F9
        Has elevated privileges:false
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Reputation:low

        Target ID:9
        Start time:14:12:31
        Start date:06/02/2023
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5408 -s 604
        Imagebase:0x890000
        File size:434592 bytes
        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
        Has elevated privileges:false
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Reputation:high

        No disassembly