Advertisement
paladin316

2906Exes_ef9e7f4c4bba8cb1990f355d8431909c_exe_2019-09-24_11_30.txt

Sep 24th, 2019
2,186
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.18 KB | None | 0 0
  1.  
  2. * ID: 2906
  3. * MalFamily: "Malicious"
  4.  
  5. * MalScore: 10.0
  6.  
  7. * File Name: "Exes_ef9e7f4c4bba8cb1990f355d8431909c.exe"
  8. * File Size: 307712
  9. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  10. * SHA256: "d8ced413907106a48f3caafd374c4fe809cb7baefa254a1e650a230226461a84"
  11. * MD5: "ef9e7f4c4bba8cb1990f355d8431909c"
  12. * SHA1: "c813db4a4a3518d049c7cde1bc45b89cfab6f836"
  13. * SHA512: "49c266cacc9ccb741b432169c386ba1985a43307cc134da40736f1fdce66f7e6b618b28a40d324afc046d7d4bd9539e3f91e9fec421a3fb8444db70a305a42f0"
  14. * CRC32: "9D973950"
  15. * SSDEEP: "3072:MHBOzBR8au+1TsBNEBNwBNEBN0Kqa5vLyUUUI4EsLS1e1zjD024m/VVVRrwpi73I:gDLiuiJ2KIB01vQ24k/VRUo3V4j9FL6"
  16.  
  17. * Process Execution:
  18. "C93vaJJ.exe",
  19. "wscript.exe",
  20. "cmd.exe",
  21. "AuditLog.exe",
  22. "svchost.exe"
  23.  
  24.  
  25. * Executed Commands:
  26. "\"C:\\Windows\\System32\\WScript.exe\" \"C:\\Users\\user\\AppData\\Local\\Temp\\install.vbs\"",
  27. "C:\\Users\\user\\AppData\\Local\\Temp\\install.vbs ",
  28. "\"C:\\Windows\\System32\\cmd.exe\" /c \"C:\\Users\\user\\DefaultUser\\AuditLog.exe\"",
  29. "cmd /c \"C:\\Users\\user\\DefaultUser\\AuditLog.exe\"",
  30. "C:\\Users\\user\\DefaultUser\\AuditLog.exe",
  31. "C:\\Windows\\SysWOW64\\svchost.exe",
  32. "\"C:\\Users\\user\\DefaultUser\\AuditLog.exe\"",
  33. "C:\\Users\\user\\DefaultUser\\AuditLog.exe "
  34.  
  35.  
  36. * Signatures Detected:
  37.  
  38. "Description": "SetUnhandledExceptionFilter detected (possible anti-debug)",
  39. "Details":
  40.  
  41.  
  42. "Description": "Behavioural detection: Executable code extraction",
  43. "Details":
  44.  
  45.  
  46. "Description": "Attempts to connect to a dead IP:Port (1 unique times)",
  47. "Details":
  48.  
  49. "IP_ioc": "194.61.24.46:2405 (unknown)"
  50.  
  51.  
  52.  
  53.  
  54. "Description": "Detected script timer window indicative of sleep style evasion",
  55. "Details":
  56.  
  57. "Window": "WSH-Timer"
  58.  
  59.  
  60.  
  61.  
  62. "Description": "A process attempted to delay the analysis task.",
  63. "Details":
  64.  
  65. "Process": "AuditLog.exe tried to sleep 729 seconds, actually delayed analysis time by 0 seconds"
  66.  
  67.  
  68.  
  69.  
  70. "Description": "Reads data out of its own binary image",
  71. "Details":
  72.  
  73. "self_read": "process: wscript.exe, pid: 2400, offset: 0x00000000, length: 0x00000040"
  74.  
  75.  
  76. "self_read": "process: wscript.exe, pid: 2400, offset: 0x000000f0, length: 0x00000018"
  77.  
  78.  
  79. "self_read": "process: wscript.exe, pid: 2400, offset: 0x000001e8, length: 0x00000078"
  80.  
  81.  
  82. "self_read": "process: wscript.exe, pid: 2400, offset: 0x00018000, length: 0x00000020"
  83.  
  84.  
  85. "self_read": "process: wscript.exe, pid: 2400, offset: 0x00018058, length: 0x00000018"
  86.  
  87.  
  88. "self_read": "process: wscript.exe, pid: 2400, offset: 0x000181a8, length: 0x00000018"
  89.  
  90.  
  91. "self_read": "process: wscript.exe, pid: 2400, offset: 0x00018470, length: 0x00000010"
  92.  
  93.  
  94. "self_read": "process: wscript.exe, pid: 2400, offset: 0x00018640, length: 0x00000012"
  95.  
  96.  
  97. "self_read": "process: AuditLog.exe, pid: 2452, offset: 0x00000000, length: 0x0004b200"
  98.  
  99.  
  100.  
  101.  
  102. "Description": "A process created a hidden window",
  103. "Details":
  104.  
  105. "Process": "C93vaJJ.exe -> C:\\Users\\user\\AppData\\Local\\Temp\\install.vbs"
  106.  
  107.  
  108. "Process": "wscript.exe -> cmd"
  109.  
  110.  
  111.  
  112.  
  113. "Description": "A scripting utility was executed",
  114. "Details":
  115.  
  116. "command": "\"C:\\Windows\\System32\\WScript.exe\" \"C:\\Users\\user\\AppData\\Local\\Temp\\install.vbs\""
  117.  
  118.  
  119.  
  120.  
  121. "Description": "Uses Windows utilities for basic functionality",
  122. "Details":
  123.  
  124. "command": "\"C:\\Windows\\System32\\cmd.exe\" /c \"C:\\Users\\user\\DefaultUser\\AuditLog.exe\""
  125.  
  126.  
  127. "command": "cmd /c \"C:\\Users\\user\\DefaultUser\\AuditLog.exe\""
  128.  
  129.  
  130.  
  131.  
  132. "Description": "Behavioural detection: Injection (Process Hollowing)",
  133. "Details":
  134.  
  135. "Injection": "AuditLog.exe(2452) -> svchost.exe(2336)"
  136.  
  137.  
  138.  
  139.  
  140. "Description": "Executed a process and injected code into it, probably while unpacking",
  141. "Details":
  142.  
  143. "Injection": "AuditLog.exe(2452) -> svchost.exe(2336)"
  144.  
  145.  
  146.  
  147.  
  148. "Description": "Behavioural detection: Injection (inter-process)",
  149. "Details":
  150.  
  151.  
  152. "Description": "Installs itself for autorun at Windows startup",
  153. "Details":
  154.  
  155. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\DefaultUser"
  156.  
  157.  
  158. "data": "\"C:\\Users\\user\\DefaultUser\\AuditLog.exe\""
  159.  
  160.  
  161.  
  162.  
  163. "Description": "Creates a hidden or system file",
  164. "Details":
  165.  
  166. "file": "C:\\Users\\user\\DefaultUser\\AuditLog.exe"
  167.  
  168.  
  169. "file": "C:\\Users\\user\\DefaultUser"
  170.  
  171.  
  172.  
  173.  
  174. "Description": "File has been identified by 18 Antiviruses on VirusTotal as malicious",
  175. "Details":
  176.  
  177. "FireEye": "Generic.mg.ef9e7f4c4bba8cb1"
  178.  
  179.  
  180. "Malwarebytes": "Trojan.MalPack.GS"
  181.  
  182.  
  183. "Cybereason": "malicious.a4a351"
  184.  
  185.  
  186. "Invincea": "heuristic"
  187.  
  188.  
  189. "Symantec": "Packed.Generic.528"
  190.  
  191.  
  192. "APEX": "Malicious"
  193.  
  194.  
  195. "Paloalto": "generic.ml"
  196.  
  197.  
  198. "Emsisoft": "Trojan-Ransom.Shade (A)"
  199.  
  200.  
  201. "McAfee-GW-Edition": "BehavesLike.Win32.MultiPlug.fh"
  202.  
  203.  
  204. "Trapmine": "malicious.moderate.ml.score"
  205.  
  206.  
  207. "Webroot": "W32.Trojan.Gen"
  208.  
  209.  
  210. "Microsoft": "Trojan:Win32/Wacatac.B!ml"
  211.  
  212.  
  213. "Endgame": "malicious (high confidence)"
  214.  
  215.  
  216. "Acronis": "suspicious"
  217.  
  218.  
  219. "Cylance": "Unsafe"
  220.  
  221.  
  222. "Rising": "Stealer.Agent!8.C2 (TFE:6:BZHf25MkWlT)"
  223.  
  224.  
  225. "CrowdStrike": "win/malicious_confidence_100% (W)"
  226.  
  227.  
  228. "Qihoo-360": "HEUR/QVM10.1.1953.Malware.Gen"
  229.  
  230.  
  231.  
  232.  
  233. "Description": "Creates a copy of itself",
  234. "Details":
  235.  
  236. "copy": "C:\\Users\\user\\DefaultUser\\AuditLog.exe"
  237.  
  238.  
  239.  
  240.  
  241. "Description": "Drops a binary and executes it",
  242. "Details":
  243.  
  244. "binary": "C:\\Users\\user\\DefaultUser\\AuditLog.exe"
  245.  
  246.  
  247.  
  248.  
  249.  
  250. * Started Service:
  251.  
  252. * Mutexes:
  253. "Remcos_Mutex_Inj",
  254. "MSOffice-FNHK9C",
  255. "Local\\ZoneAttributeCacheCounterMutex",
  256. "Local\\ZonesCacheCounterMutex",
  257. "Local\\ZonesLockedCacheCounterMutex",
  258. "Mutex_RemWatchdog"
  259.  
  260.  
  261. * Modified Files:
  262. "C:\\Users\\user\\DefaultUser\\AuditLog.exe",
  263. "C:\\Users\\user\\AppData\\Local\\Temp\\install.vbs"
  264.  
  265.  
  266. * Deleted Files:
  267. "C:\\Users\\user\\AppData\\Local\\Temp\\install.vbs"
  268.  
  269.  
  270. * Modified Registry Keys:
  271. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\DefaultUser",
  272. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\UNCAsIntranet",
  273. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\AutoDetect",
  274. "HKEY_CURRENT_USER\\Software\\MSOffice-FNHK9C\\",
  275. "HKEY_CURRENT_USER\\Software\\MSOffice-FNHK9C\\exepath",
  276. "HKEY_CURRENT_USER\\Software\\MSOffice-FNHK9C\\licence",
  277. "HKEY_CURRENT_USER\\Software\\MSOffice-FNHK9C\\WD",
  278. "HKEY_CURRENT_USER\\Software\\MSOffice-FNHK9C\\WDH"
  279.  
  280.  
  281. * Deleted Registry Keys:
  282. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\ProxyBypass",
  283. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\ProxyBypass",
  284. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\IntranetName",
  285. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\IntranetName",
  286. "HKEY_CURRENT_USER\\Software\\MSOffice-FNHK9C\\WD"
  287.  
  288.  
  289. * DNS Communications:
  290.  
  291. * Domains:
  292.  
  293. * Network Communication - ICMP:
  294.  
  295. * Network Communication - HTTP:
  296.  
  297. * Network Communication - SMTP:
  298.  
  299. * Network Communication - Hosts:
  300.  
  301. "country_name": "unknown",
  302. "ip": "194.61.24.46",
  303. "inaddrarpa": "",
  304. "hostname": ""
  305.  
  306.  
  307.  
  308. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement